• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Which of the following maximum resolutions does the UXGA video technology supports?

A. 1600 x 1200
B. 2560 x 1600
C. 1280 x 1024
D. 2048 x 1536
UXGA stands for Ultra eXtended Graphics Array. It is a display standard that refers to video adapters. This display standard is capable of displaying the resolution of 1600 x 1200 pixels. A UXGA display provides four times more pixels than an 800 x 600 display.
Which of the following maximum resolutions does the QXGA video technology supports?

A. 1600 x 1200
B. 2560 x 1600
C. 1280 x 1024
D. 2048 x 1536
The QXGA video technology supports a maximum resolution of 2048 x 1536.
Which of the following maximum resolutions does the WQXGA video technology supports?

A. 1600 x 1200
B. 2560 x 1600
C. 1280 x 1024
D. 2048 x 1536
The WQXGA video technology supports a maximum resolution of 2560 x 1600.
Which of the following maximum resolutions does the SXGA video technology supports?

A. 1600 x 1200
B. 2560 x 1600
C. 1280 x 1024
D. 2048 x 1536
The SXGA video technology supports a maximum resolution of 1280 x 1024.
What is cloud computing typically used for?
Cloud computing typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet. It provides common business applications online that are accessed from a web browser, while the software and data are stored on the servers.
What is 'thin client' typically used for?
A thin client is a low-cost computer, often legacy desktops, with limited resources. Thin clients run the latest operating systems (Windows 2000 Server and Windows Server 2003) and applications through special software such as the Terminal Services application. There is no
requirement to install and configure applications on each computer, as the software are installed and configured in a centralized location on the server. Hence, the maintenance tasks are centralized.
What is 'terminal services' typically used for?
Terminal Services is a multisession environment that provides remote computers access to Windows-based programs running on a server. When a user runs a program on a
Terminal Server, the application execution takes place on the server, and only the keyboard, mouse and display information are transmitted over the network. Each user sees only his individual session, which is
managed transparently by the server operating system, and is independent of any other client session.
What is 'Application Virtualization' typically used for?
Application virtualization is an umbrella term that describes software
technologies that improve portability, manageability and compatibility of applications by encapsulating them
from the underlying operating system on which they are executed.
Which of the following virus is a script that attaches itself to a file or template so that when the file is loaded, the instructions of the script are executed?

A. Boot sector
B. Macro virus
C. Trojan horse
D. E-mail virus
B. Macro virus
A boot-sector virus infects the boot record on hard disks and floppy disks,
which is used to start the computer. When the computer is turned on or restarted, the virus is automatically
executed. An infected boot disk may stop the computer from starting up.
Boot sector virus
An e-mail virus moves around in e-mail messages, and usually replicates itself
by automatically mailing itself to many people in the their e-mail address book.
E-mail virus
A Trojan horse program can contain viruses, but it is not a virus itself.
Trojan horse
9. Which of the following is a case sensitive text string used in wireless network and having a maximum length of 32 characters?

A. WAP
B. SSID
C. WEP
D. WTLS
B. SSID

SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitive text strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to communicate with each other.

The SSID on computers and the devices in WLAN can be set manually or automatically. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict.

A network administrator often uses a public SSID that is set on the access point. The access point broadcasts SSID to all wireless devices within its range. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve the network security.
What does the acronym SSID stand for?
SSID stands for Service Set Identifier.
What does the acronym WEP stand for?
Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.
What does the acronym WAP stand for?
The Wireless Access Protocol (WAP) is a technology used with wireless devices. The functionality of WAP is equivalent to that of TCP/IP. WAP uses a smaller version of HTML called Wireless Markup Language (WML) to display Internet sites.
What does the acronym WTLS stand for?
Wireless Transport Layer Security (WTLS) is a security layer of WAP, which is specifically designed for a wireless environment. It provides privacy, data integrity, and authentication for client-server communications over a wireless network. WTLS ensures that a client and server are authenticated so that wireless transactions remain secure and the connection is encrypted. WTLS is required because a wireless network does not provide end-to-end security.
Which of the following firewalls inspects the actual contents of packets?

A. Packet filtering firewall
B. Application-level firewall
C. Stateful inspection firewall
D. Circuit-level firewall
The application level firewall inspects the contents of packets, rather than the source/destination or connection between the two. An Application level firewall operates at the application layer of the OSI model.
What does a circuit-level firewall do?
The circuit-level firewall regulates traffic based on whether or not a trusted
connection has been established. It operates at the session layer of the OSI model.
What does a stateful inspection firewall do?
The stateful inspection firewall assures the connection between the two
parties is valid and inspects packets from this connection to assure the packets are not malicious.
What does a packet filtering firewall do?
The packet filtering firewall filters traffic based on the headers. It operates at the network layer of the OSI model.
What does an Application-level firewall do?
The application level firewall inspects the contents of packets, rather than the source/destination or connection between the two. An Application level firewall operates at the application layer of the OSI model.