complete solution
What is the name of the software that lets you run multiple operating systems on
the physical server ?
A Processor
B Guest operating system
C Hypervisor
D Virtual machine
C Hypervisor
Determining the host name of the device if you know the ip address or
determining the ip address if you know the host name. What tool can you use ?
A Nslookup
B Ping
C telnet
D Get
A Nslookup
Your design specifications call for a wireless technology that can use the 5 GHz
band at up to 100 Mbps. Which of the following is the best fit for your network ?
A 802.11b
B None of the others
C 802.11g
D 802.11n
D 802.11n
What program can you use to keep your system patched and up-to-date ?
A Windows Dispatcher
B Windows Update
C Windows Patcher
D Windows Upgrade
B Windows Update
A group of servers placed in the same location, as in a computer machine room
A Rack
B server Farm
C Desktop Farm
D Cloud Computing
B server Farm
In relation to a computer attack, refers to the use to human interaction to gain
access to an individual's personal information or to a computer system to do
damege or acquire access or information-for example, through a bogus e-mail or
telephone call
A Fishing attach
B None of the Others
C Sniffer attack
D Social engineering attack
D Social engineering attack
, Software or hardware that secures data from being accessed outside a network
and that can also prevent data from leaving the network through an inside source
A Firewall
B Switch
C Loadbalancing
D Router
A Firewall
Which of the following should the administrator configure to enforce quota limits
for users when they create ne folders ?
A File quota temolate
B File Screen
C File Goup
D None of the others
C File Goup
Routers operate at which layer of the OSI model ?
A Network
B Physical
C transport
D Application
A Network
What is the maximum bandwidth that can be supported by fiber optics cable ?
A 100 Mbps
B 50 Mbps
C 2000 Mbps
D 20 Mbps
C 2000 Mbps
Which of the following are transport layer protocols ?
A Tcp and Udp
B TFTP
C IP
D ARP
A Tcp and Udp
A one-to-one communication between one source and one destination is
classified ad a _____ communication
A Broadcast
B Multicast
C Unicast
D none of the others
C Unicast
A performance assessment of a network under varying loads or circumstances
A Benchmark
B Monitor
C Load Balancing
D None of the others
A Benchmark