Shared Flashcard Set

Details

Test 2 (Software)
Comptia A+ Guide to maintaining your PC, 7th Edition
100
Computer Networking
04/18/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
False
Definition
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
Term
False
Definition
When using static IP addressing, software automatically configures the network connection on each device.
Term
True
Definition
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
Term
True
Definition
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
Term
False
Definition
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
Term
False
Definition
A WLAN covers a large geographical area and is made up of many smaller networks.
Term
True
Definition
A half duplex connection allows a device to send and receive, but not at the same time.
Term
False
Definition
Phone cords are a type of twisted-pair cable and use an RJ-45 connector.
Term
False
Definition
10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters.
Term
True
Definition
A punchdown tool is used to wire twisted-pair cabling to a keystone jack.
Term
False
Definition
On the IE General tab you can block cookies.
Term
True
Definition
The default value of the security level in IE is Medium-high.
Term
False
Definition
To use Remote Desktop, the computer you access remotely can be running Windows 7 Home Premium or Windows 7 Professional.
Term
False
Definition
When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.
Term
True
Definition
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
Term
False
Definition
On a peer-to-peer network, authentication is the responsibility of the domain.
Term
True
Definition
Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.
Term
False
Definition
After initially installing Windows 7, you need to disable the Guest account so nobody can use it.
Term
True
Definition
Using Group Policy, you can set security policies to help secure a workstation.
Term
False
Definition
It’s usually a good idea to run several anti-malware programs at the same time on your computer.
Term
True
Definition
Notebooks use the same technology as desktops except they use less power and take up less space.
Term
False
Definition
Notebook computer cases tend to be similar to one another, and components in notebook systems tend to be interchangeable among manufacturers.
Term
True
Definition
In a notebook, replacing the motherboard probably means you’ll need to fully disassemble the entire notebook except the LCD assembly.
Term
True
Definition
Sometimes, a notebook LCD panel, including the entire cover and hinges, is considered a single field replaceable unit, and sometimes components within the LCD assembly are considered an FRU.
Term
False
Definition
A all-in-one computer uses the same size components as desktop computers and components like the motherboard can be replaced with any off-the-shelf component.
Term
IP address
Definition
What is the name of a 32-bit or 128-bit number that is used to identify a device?
Term
dynamic
Definition
Which type of IP address is configured by a server when a device first initiates a connection to the network?
Term
subnet mask
Definition
Which is used to identify the network portion and the host portion of an IP address?
Term
TCP
Definition
Which protocol makes a connection, checks whether the data is received, and resends it if it is not?
Term
virtual private network
Definition
The solution for securing private data traveling over a public network, such as the Internet, is a _________.
Term
Server Message Block (SMB)
Definition
Which TCP/IP protocol is used by Windows to share files and printers on a network?
Term
Alternate Configuration
Definition
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.
Term
SSID
Definition
What is used to identify a wireless access point?
Term
firewall
Definition
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?
Term
static IP address
Definition
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?
Term
MAN
Definition
Which of the following network types covers a large campus or city?
Term
star
Definition
Which physical topology uses a centralized device to manage traffic on the network?
Term
ad hoc network
Definition
What type of network can you set up to share files if you have two laptops with wireless NICs but there is no Wi-Fi hotspot available?
Term
T3
Definition
Which network technology that is used to connect to the Internet has a maximum speed of 44 Mbps, uses dedicated lines, and is used by large companies?
Term
a. you share the cable infrastructure with your neighbors
Definition
Which of the following is true about cable Internet?
a. you share the cable infrastructure with your neighbors
b. you need filters on every phone jack
c. fiber optic cabling is required
d. provides up to 2.3 Mbps of bandwidth
Term
Auto Negotiation
Definition
What should you choose in the properties of a network connection so that Windows will use the best possible speed and duplex mode?
Term
QoS
Definition
Which feature should you configure on a network adapter to control which applications have priority on the network?
Term
bridge
Definition
What type of device do you need if you want to connect two network segments together such as a wireless network and a wired network?
Term
NAS
Definition
What device should you consider if you want to have access to hard drives via an Ethernet connection?
Term
b. 1000BaseFX
Definition
Which of the following cabling systems uses fiber-optic cable?
a.10GBaseT
b.1000BaseFX
c.10Base2
d.10Base5
Term
c. to test a network cable
Definition
Under what circumstance might you use a loopback plug?
a. to test a USB port
b. to capture network packets
c. to test a network cable
d. to find the max speed of a connection
Term
a. patch panel
Definition
Which of the following provides multiple network ports for cables that converge in an electrical closet?
a. patch panel
b. RJ-45 jack
c. terminal adapter
d. loopback port
Term
b. the twists reduce crosstalk
Definition
Which of the following is a reason that there are twists in the wires used for network cabling?
a. the twists increase the cable strength
b. the twists reduce crosstalk
c. the twists make it easier to punchdown the cable
d. the twists reduce the amount of copper needed
Term
check the indicator lights
Definition
What’s the first thing you should do to troubleshoot a network problem related to hardware?
Term
b. disable file downloads
Definition
Which of the following is a task you CAN’T do from the IE General tab?
a. change the home page
b. disable file downloads
c. delete browsing history
d. manage the IE cache
Term
d. WoL
Definition
If you want to be able to power up a computer remotely, what feature should you use?
a. QoS
b. RDP
c. RemoteApp
d. WoL
Term
b. all policies are applied before the logon screen appears
Definition
Which of the following is NOT true about Group Policy?
a. policies can be applied to a computer
b. all policies are applied before the logon screen appears
c. Group Policy is available in Windows Professional edition
d. you can set the QoS level for an application using Group Policy
Term
c. rights are assigned to accounts
Definition
Which statements is true about controlling access to folders and files?
a. permissions refer to the tasks an account is allowed to do in the system
b. account configuration should keep in mind the principle of highest privilege
c. rights are assigned to accounts
d. in Windows, accounts have no rights assignments until you configure them
Term
a. a user account can belong to only one group at a time
Definition
Which of the following is NOT true about user accounts and groups?
a. a user account can belong to only one group at a time
b. by default, standard users accounts belong to the Users group
c. Guest group has limited rights on the system
d. Backup Operators group can restore any files regardless of the group’s permissions to those files
Term
Anonymous users
Definition
Which built-in group might Windows automatically assign a user account to when determining its permissions?
Term
Homegroup
Definition
When all users on a network require the same access to all resources, what type of network model should you use?
Term
a. private data for each user should be kept in their C:\Users folder
Definition
Which of the following is true about which folders to use to hold shared data when working with a workgroup?
a. private data for each user should be kept in their C:\Users folder
b. all users have access to the folders in the C:\Users folder
c. C:\Users\Public should only be used by the Guest account
d. Only Administrators and Guest have access to C:\Users\Public
Term
NTFS on NTFS volumes only
Definition
Which type of permission should you set to control access to files and folders by local and network users?
Term
a. if both permissions are used, the least restrictive permission between the two applies
Definition
Which is NOT true about using share and NTFS permissions?
a. if both permissions are used, the least restrictive permission between the two applies
b. if NTFS permissions conflict between a user and group the least restrictive permission applies
c. when you copy a file, the file takes on the permissions of the destination folder
d. inherited permissions pass from parent folder to child file or folder
Term
Write, Read
Definition
Which NTFS permission(s) should you assign if the user should be able to create folders and files and open files to read data, but not delete files.
Term
\\server\sharedfolder
Definition
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
Term
Ctrl+Alt+Delete
Definition
What keystroke should you press to get a logon window if you don’t use the welcome screen?
Term
a. it is disabled by default
Definition
Which of the following is true about the Guest account in Windows 7?
a. it is disabled by default
b. it automatically has a complex password
c. you cannot rename it
d. it has administrative access
Term
c. by default, accounts with a blank password cannot logon remotely
Definition
Which of the following is true about passwords.
a. it’s best to write your password down so you don’t get locked out of your computer
b. passwords cannot be longer than 14 characters
c. by default, accounts with a blank password cannot logon remotely
d. letters and numbers are allowed, but no symbols such as ‘@’ or ‘!’
Term
b an encrypted file moved to an unencrypted folder remains encrypted
Definition
Which of the following is true about the Windows Encrypted File System?
a. files can be marked for encryption, but not folders
b. an encrypted file moved to an unencrypted folder remains encrypted
c. EFS only works on NTFS and FAT32
d. you need to download special software to use EFS
Term
c. you can use gpedit.msc to see if any policies conflict
Definition
Which of the following is NOT true about using Group Policy on business and professional editions of Windows?
a. you can rename default user accounts
b. you can require user accounts to have non-blank passwords
c. you can use gpedit.msc to see if any policies conflict
d. you can disable logon scripts
Term
a TPM chip on the motherboard
Definition
If you want your computer to be protected by BitLocker Encryption using computer authentication, what feature must your computer have?
Term
b. the BIOS
Definition
If you don’t want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
a. Windows POP technology
b. the BIOS
c. a feature available on some DVD drives
d. your USB keyboard
Term
smart card
Definition
One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?
Term
smart card
Definition
An RFID badge is related to which type of authentication method?
Term
screen viewing
Definition
A privacy filter is used for what aspect of security?
Term
c. degausser
Definition
Which of the following provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
a. ATA Secure Erase
b. low-level format
c. degausser
d. magnetic data filter
Term
tailgating
Definition
You should beware of a person attempting to use your computer after you step away from it, a term referred to as____________?
Term
boot sector virus
Definition
Which type of malware hides in the MBR program of a hard drive?
Term
rootkit
Definition
Which type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?
Term
bootrec /fixboot
Definition
Which command can you perform at the Windows RE command prompt to repair the OS boot record on Windows 7?
a. fixmbr
b. bootrec /fixmbr
c. fixboot
d. bootrec /fixboot
Term
Process Explorer
Definition
If you need to understand the parent-child relationships between running processes and view parent processes as they call other processes, what tool should you use?
Term
d. netbooks have fewer features than notebooks
Definition
Which of the following is true about notebooks, netbooks, and all-in-one computers?
a. all-in-one computers have the computer case and keyboard built together
b. a tablet PC is just another name for a notebook computer
c. notebooks are always less powerful than desktops
d. netbooks have fewer features than notebooks
Term
b. they are more compact
Definition
Which of the following is a reason notebooks and notebook parts typically cost more than comparable desktop PCs and components?
a. they are faster
b. they are more compact
c. they use more power
d. parts are more generic
Term
c. on all models, the hard drive is always in the same place
Definition
Which of the following is NOT true about notebook computers?
a. different models have unique cases
b. components tend to not be interchangeable
c. on all models, the hard drive is always in the same place
d. they use less power than desktops
Term
a. the OS is preinstalled at the factory
Definition
Which of the following is true about notebook computer software?
a. the OS is preinstalled at the factory
b. they use a standard version of the OS
c. you can buy off-the-shelf diagnostic software
d. no drivers are required for notebook devices
Term
in a recovery partition on the hard drive
Definition
Where are you likely to find a copy of the OS build, diagnostic software, and preinstalled applications on a notebook computer if you need to restore the system to its factory state?
Term
d. when traveling, pack the notebook tightly in a suitcase, between soft clothing
Definition
Which of the following is NOT among the guidelines for handling and caring for a notebook computer?
a. don’t hold a notebook by the lid
b. make sure the network location is Public before connecting to the Internet
c. don’t leave a notebook in a cold or hot car
d. when traveling, pack the notebook tightly in a suitcase, between soft clothing
Term
b. CPU speed
Definition
Which of the following is NOT a typical button or key combination function on a notebook computer?
a. screen brightness
b. CPU speed
c. dual displays
d. Wi-Fi on/off
Term
CardBus
Definition
hich PCMCIA standard uses the 32-bit PCI bus standards and has a bumpy strip on the edge?
Term
S2
Definition
Which ACPI power-saving state turns off the processor, hard drive, and monitor, but leaves all other devices on?
Term
for serious repairs and it is under warranty
Definition
Under what circumstance should you always return a notebook to the manufacturer?
Term
a. connect it to a port replicator, if available
Definition
Which of the following is NOT a recommended action you should take before replacing or upgrading a component in a notebook?
a. connect it to a port replicator, if available
b. back up data if the computer is working
c. remove cards and disconnect external devices
d. remove the battery and unplug the AC adapter
Term
DDR3 SO-DIMMS
Definition
Which type of memory are you likely to find in today’s laptops?
Term
2.5” SATA
Definition
Which type of hard drive is most likely found in a notebook computer?
Term
b. once you’ve learned to service one, it’s the same for all notebooks
Definition
Which of the following is NOT true about working on a notebook computer in general?
a. you should follow the same ESD precautions as on desktops
b. once you’ve learned to service one, it’s the same for all notebooks
c. you need different tools than you need for desktop maintenance
d. on newer notebooks, hard drive replacement is fairly easy
Term
you may be able to replace an expansion card without extensive disassembly
Definition
Which of the following is true about expansion cards in a notebook computer?
a. most use standard PCI Express slots but not PCI slots
b. Mini PCI Express cards are bigger than Mini PCI cards
c. you may be able to replace an expansion card without extensive disassembly
d. all Wi-Fi cards are built-in and cannot be replaced
Term
notebook processors will typically have a heatsink and fan
Definition
Which of the following is true about replacing the processor on a notebook computer?
a. notebook processors don’t need thermal compound
b. you’ll need a soldering iron for most notebooks
c. notebook processors will typically have a heatsink and fan
d. the same sockets are used by most desktop computers
Term
connect it to an external monitor
Definition
What is a fast way to determine if the problem is with the LCD panel or the video controller on a notebook computer?
Term
no drivers are installed
Definition
Which of the following is NOT a consideration for a flickering or dim video display?
a. verify Windows settings
b. adjust the LCD brightness
c. adjust the refresh rate
d. no drivers are installed
Term
worm
Definition
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Term
grayware
Definition
a program that AV software recognizes to be potentially harmful or potentially unwanted
Term
digital certificate
Definition
a code used to identify and authenticate a person or organization sending data over a network
Term
RSA tokens
Definition
type of smart card that contains authentication information
Term
adware
Definition
software installed on a computer that produces pop-up ads using your browser