Test 31-60

10 September 2022
4.7 (114 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
31. In Windows, what two terms describe the active partition on an MBR drive, and the location where the Windows operating system is stored, respectively?
answer
Boot partition, and system partition
question
32. Text files that are called initialization files often utilize what two file name extensions?
answer
.inf, .ini
question
33. What are two methods that can be used to free up disk space on a hard drive?
answer
Use file compression software, delete unused software
question
34. What file systems supported by Windows can be used for volumes and drives that don't hold the Windows installation?
answer
NTFS, FAT32, exFAT
question
35. What status indicators apply only to dynamic disks?
answer
Healthy (At Risk), Foreign drive
question
36. Unicast addresses include what types of addresses? (Choose all that apply).
answer
Global address & link-local address
question
37. What functions might be provided by a SOHO router besides the normal duty of routing packets between networks?
answer
Firewall and Wireless Access Point
question
38. What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively?
answer
telnet & SSH
question
39. What two protocols are used to deliver mail messages?
answer
IMAP4 & POP3
question
40. What two terms are used to describe the User Datagram Protocol (UDP)?
answer
connectionless protocol and best effort protocol
question
41. In the T568B wiring scheme, what two color pairs are used for transmit and receive on a 100BaseT network?
answer
white/orange, white/green
question
42. What two commands are used to display TCP/IP configuration on Windows and Unix / Linux / Mac OS X operating systems, respectively?
answer
Ifconfig, ipconfig
question
43. What two different types of coaxial cable have been used for cable TV?
answer
Rg-6 and rg-59
question
44. What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors?
answer
T568A T568B
question
45. What two terms describe the type of network cable that is used for connecting a computer to a switch or another network device?
answer
patch cable & straight-through cable
question
46. In order to ensure that a Mac has no startup items, what two directories should you check for items?
answer
/System/Library/StartupItems /Library/StartupItems
question
47. Linux utilizes what two different wildcard characters at the command line?
answer
? and *
question
48. What are some of the ways you can use BitLocker Encryption?
answer
computer authentication using TPM user authentication using a USB flash drive computer and user authentication using a PIN and TPM
question
49. What are two examples of HTPC software?
answer
Plex & Kodi
question
50. What are valid recommendations for a high-end audio/video editing workstation?
answer
install a motherboard capable of using memory running at 1600 MHz or better & Install a sound card
question
51. What inputs would be considered to be part of a biometric device?
answer
retina fingerprint voice
question
52. What is a typical use of a Type 2 hypervisor?
answer
by developers to test applications as honeypots to lure hackers
question
53. What methods exist to lock down a workstation running Windows, such as when stepping away from the screen?
answer
press Windows key + L press Ctrl+Alt+Delete and click Lock this Computer
question
54. What products are considered to be set-top boxes?
answer
Chromecast Amazon Fire TV Roku
question
55. What software program is an example of password management software?
answer
KeePass LastPass Dashlane
question
56. What terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server?
answer
zero client dumb terminal ultra-thin client
question
57. What two commands are used to change the permissions and ownership of a file or directory in Linux?
answer
chmod chown
question
58. What two types of thermal printer exist?
answer
thermal transfer & direct thermal
question
59. What wireless methods exist for connecting to a printer?
answer
Bluetooth & Wi-Fi infrastructure mode & Wi-Fi ad-hoc mode
question
60. When creating a strong password, what are some valid criteria the password should meet?
answer
The password should be 8 characters long You should not use adjacent keys on the keyword such as asdf You should combine uppercase and lowercase letters numbers and symbols