Made with lab by jabee :3
What color are USB 3.0 ports typically?
Blue
What kind of memory do SSDs use to store data?
Flash Memory
Where was the BIOS traditionally stored in a standard PC?
ISO image
How much storage space does Windows 10 need to run?
16 GB for 32-bit OS or 20 GB for 64-bit OS
On a Windows system, where are device drivers typically located?
Registry
In a computer's ATX power supply, what voltage does the red wire usually provide?
+5V
What term describes a network cable terminated with T568-A on one end and T568-B on the other?
Crossover
A red X appears over the LAN icon in Windows 7, indicating a network connectivity problem. What is the most probable cause for this error?
Problem with the LAN driver
Among the listed hardware components, can you identify the ones that can be used to establish a connection to a computer network?
Network interface Card
What piece of networking equipment is responsible for directing data packets across separate networks?
Router
Wi-Fi is a trademark phrase, which means ___.
IEEE.802.11
A _____ connects devices in a single location.
Local Area Network (LAN)
What type of network allows communication between separate LANs, often over long distances?
Wide Area Network (WAN)
What's the name for a program that safeguards your computer system by preventing, identifying, and eliminating potential security risks?
Anti-virus software
What type of network allows two or more computers to directly connect and share resources, bypassing a central server?
Peer to peer network
Depending on the virtual machine's network settings (bridged, NAT, etc.), which IP address does it use to connect to other devices on the physical network?
Provider address
What kind of network authentication method relies on a pre-configured password to verify a user's identity before granting access?
WPA2-Personal
Which access control method uses user matrices and capability tables to manage user permissions?
Access control list
What cybercrime involves stealing data and holding it hostage for a ransom?
Information Extortion
What process tracks changes to an information system's security after it's been initially approved?
Continuous Assessment
Considering cost-effectiveness, what Windows Server service can be used to migrate data from file servers to an alternative storage solution, including potentially tape media?
Remote Storage Services
In a clustered application environment, what type of group incorporates a Client Access Point and manages at least one resource dedicated to that specific application?
Virtual cluster services
What program checks if another computer can be reached on the network?
Ping
Out of these options, which key WON'T let you access BIOS settings?
F5
What built-in Windows tool troubleshoots and potentially repairs issues that prevent a normal boot?
Safe mode
On a Windows PC, which function allows booting from a hidden partition containing recovery tools to troubleshoot boot issues?
Repair Computer
A Single physical hard drive can divide into multiple ___ hard drives.
Logical
What are the two main ways a hard drive connects to a computer's motherboard?
Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA)
What term describes the vast network of interconnected information in the cyber space resembling a web?
World wide web
What thermally conductive substance is applied between the CPU and heatsink to improve heat transfer?
Thermal paste
What's the recommended maximum length for a standard USB 2.0 cable to ensure reliable data transfer?
5 meters
What type of software is pre-installed on a device's ROM chip?
Firmware
Another name for a Disc Image is an ____
ISO image
What's the minimum amount of RAM recommended to install and run Windows 10 smoothly?
1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
What built-in Windows tool lets you view and manage hardware devices and their drivers?
Device Manager
Yost, Cisco, and Console cables are all different names for the same type of cable known as ____.
Roll- Over
If the LAN connection icon on a Windows Server 2008 machine is yellow, it means there's a problem. What kind of problem does the yellow color usually indicate?
No connectivity
A network card (NIC) usually has a few indicator lights. How many LEDs does a typical NIC have?
2
Which port redirection technique leverages NAT to map incoming requests on a public IP and port to a specific internal device's IP and port?
Forwarding
What wireless technology uses radio waves to connect devices to a router, eliminating the need for cables?
Wireless Fidelity
What type of computer network connects several local area networks (LANs) within a limited geographical area, like corporate buildings or university campuses?
Campus Area Network
Which network technology interconnects Local Area Networks (LANs) within a geographic region of a city, typically ranging from 5 to 50 kilometers?
Metropolitan Area Network
Which team or role is responsible for keeping the network secure, operational, and managing user access?
Network Administrator
What device is used to hold a large amount of users' documents?
File Server
What IP address used by virtual machine to communicate over the physical network?
Provider address
What kind of network login system verifies users through a central server, offering stronger security but being more complex to set up?
WPA2-Enterprise
What tells a server which program should receive incoming messages from the network?
Port Number
A program that runs tasks automatically in response to specific events is called a ____.
Bot
What tool lets server administrators set limits on how much space certain types of data can use on NTFS drives?
File System Quota
What Windows Server feature allows you to move applications and services between different server clusters?
Failover
In Windows Performance Monitor, what type of log files capture performance data collected from various objects and their instances?
Counter Logs
In the Windows Recovery Console, which command scans a disk drive for errors and attempts to repair them?
Chkdsk
A computer system is considered operational when it's in a ____ state.
Normal booting
What built-in Windows feature keeps your system up-to-date and installing the latest version whenever it is available?
Fully automatic
What are the tiny areas on a hard drive that are broken and can't store information anymore?
Bad sector
What happens when multiple devices on a network try to use the same address to communicate?
IP address conflict
If you're getting errors when copying files or starting your computer, what hardware might be failing?
Hard disk
In Windows Recovery Console, which command specifically writes a new master boot record (MBR) to a selected disk drive?
Fixmbr
What's the expected maximum distance a USB 3.0 device will reliably function with a non-twisted pair cable?
3 meters
M.2 is a small, modern connector used for what type of components in computers?
Storage drive
What type of non-volatile memory chip stores the BIOS configuration data on a computer motherboard?
Real Time Clock/Non Volatile Random Access Memory (RTC/NVRAM) chip
It is used as a substitute for actual disc, allowing users to run software without having to load a CD or DVD.
ISO file
What windows edition has a program capable or restricting other users to access certain programs in computer?
Windows ultimate
In what folder that the device driver can be found
System32
An ideal voltage range on the hotwires of a molex connector?
Red= 5v, Yellow= 12v
What Ethernet cable used to connect computers to hubs and switches?
Straight-thru
A network interface controller also known as ___.
LAN Card
What class of IP address is 192.168.0.1?
Class A
A router that is design to operate in the internet backbone.
Core
___ allows to define a list devices and only allow those devices on Wi-Fi network.
MAC Address Filtering
What type of network that connects through signals, e. g. infrared?
Wireless Personal Area Network
___allows users to move around the converge area in a line of sight while maintaining a network connection.
Wireless Local Area Network
___is an enterprise-level heterogeneous backup and recovery suite.
NetBackup
A type of server that allows the central administration and management of network users and network resources.
File server
___ is an information asset suffering damage, unintended modification or disclosure.
Loss
The network security standard tries to make connections between a router and wireless devices faster and easier.
WPS
Which of the following is the most efficient in transferring larger files?
File transfer protocol
What technique used to gain unauthorized access to computers, wherein the intruder sends messages with a IP address?
Spoofing
What technique used to gain unauthorized access to computers, wherein the intruder sends messages with a IP address?
Spoofing
It enables administrators to define the types of file that can save within a windows volume and folder.
File Screening
What second clustering technology provides by corresponding client requests across several servers with replicated configurations?
Network Load Balancing
What log files that conserves disk space by ensuring that the performance log file will not continue growing over certain limits?
Circular Logging
_____ should be upgraded to receive and transmit strong signals to and from other computer.
Network card
A protocol that provides quick, automatic, and central management for the distribution of IP addresses within a network.
Dynamic Host Control Protocol (DHCP)
What command-line tool used to find the IP address that corresponds to a host or domain name?
Nslookup
What is the problem of a computer if the time and date keeps on resetting even after fixing in the BIOS?
CMOS battery failure
A tool used for checking the condition of the hard drive with signs like "Good", "Caution" or "Bad".
CrystalDiskinfo
A task to do after planning to fix the network is___.
Implementing the solution
A process of scanning, identifying, diagnosing and resolving problems, errors and bugs in software.
Software troubleshooting
___________ is a 24 pin USB connector system with a rotationally symmetrical connector.
Universal Serial Bus (USB) C Thunderbolt
It facilitates communication between the CPU and other devices in the system.
Chipset
What option in the BIOS/UEFI used to over clock computer?
Voltage Basic Input Output System (BIOS)
Minimum byte capacity of a bootable flash drive for Windows 10 is_
8GB
What is the minimum RAM requirement of Server 2012 R2?
512MB
In Windows 7, Windows update and security is located in .
Settings
What voltages that ATX12V P1 connector provides for the motherboard?
3.3V, 5V, 12V
__________ defined as a structured network cabling system standards for commercial buildings, and between buildings in campus environments.
ANSI/TIA-568
In networking, through a networking _________ refers to pieces of related information that are transferred through the network
Connection
What Class of IP addressing is 172.168.10.1?
Class B