Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Computer Science » Page 36

Computer Science

Q: Mozilla is an open-source Web browser that is installed in Red Hat Linux 9.x by default when the _____ desktop is used.a. GNU b. KDE c. GNOMEd. LINX

Q: Which of the following options is a preconfigured security setting in the Internet Explorer Enhanced Security Configuration component?a. None b. Medium-high c. Medium-lowd. Maximum

Q: Which of the following content is disabled in the Internet Explorer Enhanced Security Configuration zone "Internet zone using High security"?a. ActiveX controls b. Scripts c. Executablesd. All of the above

Q: What must be installed for Windows-based computers to use Samba?a. An NTFS partitionb. File and Printer Sharing c. The SMB protocold. Nothing needs to be installed

Q: Which security option in Samba is used to designate a different computer to provide access through Samba?a. security = user b. security = share c. security = serverd. None of the above

Q: Which security option in Samba means that users can log on anonymously?a. security = user b. security = share c. security = defaultd. security = server

Q: Which security option in Samba means that the current user can access computers through Samba and must supply a user account and password for each computer that is accessed?a. security = userb. security = share c. security = serverd. security = default

Q: What is the default security option in Samba?a. security = user b. security = server c. security = shared. None of the above

Q: What protocol does Samba use?a. NFS b. SMB c. RPCd. TCP

Q: Which protocol is particularly suited to computers that perform high-volume transaction processing involving records stored within data files or databases, and in situations in which data files are distributed among several servers?a. FTP b. SMB c. NFSd. HTTPS

Q: Which FTP command transmits a file to another computer?a. send b. transmit c. putd. upload

Q: Which FTP command obtains multiple files from another computer?a. get b. input c. retrieved. mget

Q: Which FTP command sends a file to another computer?a. push b. send c. transferd. put

Q: Which FTP command ends the file transfer session and exits the FTP mode?a. bye b. quit c. closed. Both a and be. Both a and c

Q: Which FTP command transfers files in binary format?a. ASCII b. binary c. based. hex

Q: Which security method is used to provide encryption for MIME data and to apply a digital signature to MIME data?a. MOSS b. S-HTTP c. SMTPd. FERN

Q: Which security method is defined in RFP 2630?a. RAS b. S-HTTP c. MOSSd. CMS

Q: Which of the following protocols provides for both authentication and encryption?a. HTTP b. HTTP-S c. S-HTTPd. HTTPS

Q: Which protocol is used to exchange information over the World Wide Web?a. HTTP b. FTP c. NFSd. SMB

Q: PPP supports network protocols, such as IPX/SPX, NetBEUI, and TCP/IP. _________________________

Q: Remote access protocols are used to carry network packets over a WAN link. _________________________

Q: X.25 is more commonly used in Europe and other countries than in the United States. _________________________

Q: ISDN basic rate interface consists of two channels. _________________________

Q: Mozilla is an open-source Web browser that is installed in Mac OS X by default. _________________________

Q: In Internet Explorer, the restricted sites zone is used to designate specific sites that are safe to access. _________________________

Q: The NFS software that was originally developed by Sun Microsystems uses remote procedure calls via TCP port 111. _________________________

Q: With FTP, Port 20 is a control port for FTP commands that control how data is sent. _________________________

Q: In SSL, the client makes a secure connection request, and the server replies with a digital certificate accompanied by a public key. _________________________

Q: When used with S-HTTP, CMS is used to provide encryption for MIME data and to apply a digital signature to MIME data. ______________________________

Q: A Windows 2000/2003 server can be set up as a VPN server by implementing Routing and Remote Access Services.

Q: MS-CHAP v2 is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication.

Q: A VPN is a private network that is like a tunnel through a larger network.

Q: CSLIP supports network connection authentication to prevent someone from intercepting a communication.

Q: The maximum downstream transmission speed of ADSL is 6.0 Mbps.

Q: Windows 2000 Professional and Windows XP Professional do not offer RAS services and rely on their server counterparts to provide this service.

Q: Windows Server 2003 enables the installation of the Internet Explorer Enhanced Security Configuration component that should be installed to provide strong security options for this server operating system.

Q: NFS is a connectionless protocol that runs within UDP.

Q: Port 21 is a control port for FTP commands that controls how data is sent.

Q: HTTPS is used primarily in native HTTP communications and does not encrypt data in IP-level communications.

Q: What seven security techniques does Windows 2000 Professional use to support WNICs?

Q: What two key lengths are used in WEP encryption?

Q: What four general steps are used in the wireless communication authentication process?

Q: List five of the common wireless security measures that can be taken to protect a wireless network.

Q: What two approaches should be considered when planning for wireless communications?

Q: What two things can an attacker do after successfully launching a man-in-the-middle attack?

Q: What four main elements can an attacker use to locate a wireless network?

Q: List the four transmission speeds available when using the 802.11b standard?

Q: List five needs are wireless networks are designed and installed to accommodate? (List five.)

Q: ____________________ software determines the location of a network, but it can also determine whether the network is an IBBS or ESS topology.

Q: ____________________ transmissions can be broadcast in a single direction or in all directions, using a LED to transmit and a photodiode to receive.

Q: The 802.11b standard uses _____________________________________________, which is a method for radiating a data-carrying signal over radio waves.

Q: 802.11a uses _____________________________________________ which functions by dividing the 5-GHz frequency range into a series of 52 subcarriers or subchannels.

Q: In CSMA/CA, a station waiting to transmit determines if the frequency is idle by checking the ___________________________________ level.

Q: In ____________________ access, the access point also functions as a point coordinator.

Q: Because a(n) ____________________ antenna radiates primarily in one direction, the signal goes farther from the source.

Q: A(n) ____________________is a device that sends out (radiates or transmits) and picks up (receives) radio waves.

Q: A limitation of ____________________ transmissions is that they are interrupted by tall land masses, such as hills and mountains.

Q: ____________________ are licensed by the FCC to transmit voice, Morse code, data, satellite, and video signals over radio waves and microwaves.

Q: Does the 802.11a wireless transmission standard operate in the 5-GHz range?

Q: In CSMA/CA, is the backoff time determined by multiplying a predetermined slot-time by a random number?

Q: Is priority-based access also called the distributed coordination function?

Q: Does the signal gain in an indoor network generally need to be as high as for an outdoor network?

Q: Does a directional antenna send radio waves in one main direction and generally amplify the radiated signal to a greater degree than an omnidirectional antenna?

Q: Is an access point usually a router or switch?

Q: Does the 802.11 standard focus on use of the physical and data-link layers (layers 1 and 2) of the OSI model?

Q: Are network signals transmitted over radio waves in a fashion similar to the way your local radio station broadcasts?

Q: Does Red Hat Linux 9.x support Bluetooth and offer the Bluetooth Setup Assistant, the Bluetooth Serial Utility, and the Bluetooth File Exchange tools?

Q: Does Mac OS X and Apples iMac, iBook, Powerbook G4, and Power Mac G4 computers come with built-in compatibility for 3COM WNICs and base stations (access points)?

Q: What type of wireless network topology is being displayed in the figure above?a. ESS b. IBSS c. 802.11Rd. SOS

Q: What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional

Q: What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional

Q: What type of device does an attacker use to determine the location of a target wireless network?a. Antenna b. GPS c. WNICd. War-driving software

Q: What is the distance that most Bluetooth devices can transmit?a. 30 feet b. 60 feet c. 100 feetd. 300 feet

Q: Which wireless roaming protocol generally conforms to the 802.11 standard?a. ESS b. IAPP c. IBSSd. IWAP

Q: What is the name of a wireless topology that uses two or more access points?a. Multiple-cell wireless LAN b. Multi access point LAN c. Multiple-cell wireless WANd. Multi access point WAN

Q: Which wireless network topology uses access points to provide a more extensive area of service?a. BSS b. ESS c. IBSSd. SES

Q: What is the maximum speed of transmission for directional 802.11R?a. 1 Mbps b. 16 Mbps c. 22 Mbpsd. 56 Mbps

Q: In which frequency range does 802.11R operate?a. 1 Ghz to 2 Ghz b. 2 Ghz to 5 Ghz c. 100 Ghz to 1000 Ghzd. 100 Ghz to 1000 Thz

Q: Which is the most expensive wireless standard to implement?a. 802.11b b. 802.11g c. 802.11ad. They are all about the same

Q: What is the maximum operating speed of the 802.11b standard?a. 11 Mbps b. 22 Mbps c. 56 Mbpsd. 54 Mbps

1 2 3 … 99 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved