What devices are mostly small, lightweight, and designed for mobile...
What are minor software updates or improvements called?
This practice uses tapes, eletronic vaulting, or mirrored disks and...
What entails how we communicate and manage data?
What is one of the best habits a CST can form in order to save time,...
What is the unique identification number a network interface card...
What part of client systems includes the physical aspect of computers,...
When troubleshooting after a system failure, this step is a last...
What type of remote network provides a private tunnel through public...
Which of these is a disadvantage of client-server networks?
What protocol provides an almost unlimited number of IP addresses?
What is installed on a computer to act as the interface between the...
Any hardware added to a computer that expands its capabilities is...
What is an essential tool for any CST to find software approved for...
What type of remote network access is often the only choice for rural...
What does Wi-Fi use to carry network signals to the network access...
Which file system is the best choice for data storage if the server is...
What piece of equipment is at the core of most Wi-Fi networks?
The term used to refer to the process of launching the OS is the
Which hardware requirement is defined as the model and the clock speed...
Which item is not a good practice in helping with future...
What type of printer software configuration option requires a new port...
What program translates commands between a device and the programs...
What is the simplest and most efficient way to duplicate a...
Use which tool to list all installed device drivers and their status,...
What item below is not found in the Active Directory structure?
Which term describes that data is whole or complete?
With a software license agreement, who has the full rights to the...
Members of this group have full control of the server or individual...
What technology involves the capture and storage of a distinctive,...
Which is not a valid form of identity management?
Printer hardware configuration via the web is done through
Which type of memory is used to duplicate frequently used information...
Who centrally manages the Air Force server updates that keep your...
What describes how a computer finds a specific byte it is looking for...
Which media has a storage capacity of a GB-TB, has a slow to moderate...
The specifications that should be met, if not exceeded, to ensure a...
What should be done before anything else, once the operating system...
What are the two major ways to implement a client server network?
How many byte sectors is a hard disk divided into?
The first sector at the beginning of a hard drive is called the master
If this security feature is enabled on a wireless network, access...
What piece of test equipment can help verify connectivity and identify...
This type of memory is blank and instructions can be placed on...
What access control uses segregation of duties and security screening...
What percentage of all network problems occur at the data link and...
The transfer of eight bits of data simultaneously through eight...
Which type of memory stores configuration information, and is used by...
What drives faster processing speeds and increases the power of many...
What device receives information from the internet and translates it...
What stores print jobs in a print queue until a printer becomes...
Reading and storing a document on a hard disk or some other storage...
Which is not a transmission medium for a wireless local area network?
Which patch will prevent exploitation and remove or mitigate a threats...
Which information is not required when configuring TCP/IP?
What is used to organize different types of accounts into manageable...
Which alarm category in the network management system indicates a...
What tool can launch individual troubleshooting/configuration programs...
What type of memory is nonvolatile, considered permanent, and is also...
The Public Key Infrastructure component that would be necessary if the...
A spooled print job can be several times larger than the printed...
The most common hardware diagnostic tool is the
A formatted disk partition that is used for a particular file system...
This OS tool allows the viewing of the number of sent packets, status,...
Which logical troubleshooting step would include classifying the...
User accounts are uniquely identified by the
What program sets up the divisions of memory that hold the operating...
Which is a very simple example of an error detecting code?
What data integrity method is used in high-end personal computers and...
What function enables the higher layer protocol data units to fit into...
A static internet protocol address on a network printer during...
What software activates the actual transmission and receipt of data...
Groups in active directory are directory
In network troubleshooting, any event that has a negative effect on...
Which type of network is often called the GigE network?
How many bits long are the addresses that computer instructions work...
What is an electronic credit card-like device that establishes your...
How many connector interfaces does a network interface card (NIC)...
Which of these is not a prominent characteristic of an operating...
Which backup type does not clear archive flags once the backup job is...
Which of the following is not one of the three types of interfaces?
Which is not a way in which round trip delay can be determined?
Which item is not an oprtical storage media?
What is configured to provide or deny users access to service on a...
Which is NOT a basic function of antivirus programs?
Which item resides on a domain controller and provides access to...
How much power does a NAND drive require?
Which AFI governs software use?
Within how many bytes of a transmission should a network interface...
By default, the first domain controller in active directory service is...
How does a router send information to the internet on a wireless...
This is an authorized method of cleaning and sanitizing many types of...
Which cleaning process overwrites all addressable locations with...
The action that involves localization and identification of...
Which of the below is not a type of computer user interface?
Which fault isolation technique may entail checking the cable...
In a network environment, what may be responsible for all or some of...
On a network, what system manages network resources, allows other...
What physical structure component is a collection of Internet Protocol...
What item is a means by which Windows products are updated and kept...