Professional Documents
Culture Documents
____ is a process that blocks a group of tracks and sectors to be used by a particular file system, such as NTFS.
Student
Value Correct Answer Feedback
Response
1. Formatting
2. Fragmenting
3. Defragmenting
4. Partitioning 100%
Score: 2/2
The process of ____ locates fragmented folders and files and moves them to a location on the physical disk so
they are in contiguous order.
Student
Value Correct Answer Feedback
Response
1. partitioning
2. formatting
3. fragmenting
4. defragmenting 100%
Score: 2/2
Disk ____ is a fault-tolerance method that prevents data loss by duplicating data from a main disk to a backup
disk.
Student
Value Correct Answer Feedback
Response
1. mirroring 100%
2. duplexing
3. stripping
4. spanning
Score: 2/2
Disk mirroring involves creating a shadow copy of data on a backup disk and is RAID ____.
Student
Value Correct Answer Feedback
Response
1. Mirror
2. Shadow
3. level 0
4. level 1 100%
Score: 2/2
____ RAID implements fault tolerance through the server’s operating system.
Student
Value Correct Answer Feedback
Response
1. Physical
2. Virtual
3. Software 100%
4. Hardware
Score: 2/2
____ is a process that creates a table containing file and folder information for a specific file system in a
partition.
Student
Value Correct Answer Feedback
Response
1. Defragmenting
2. Partitioning
3. Fragmenting
4. Formatting 100%
Score: 2/2
A(n) ____ backup only backs up files that are new or that have been updated.
Student
Value Correct Answer Feedback
Response
1. custom
2. full
3. network
4. incremental 100%
Score: 2/2
Disk ____ is the ability to spread data over multiple disks or volumes.
Student
Value Correct Answer Feedback
Response
1. mirroring
2. formatting
3. striping 100%
4. partitioning
Score: 2/2
The ____ partition is the partition where your computer will look for the hardware-specific files to start the
operating system.
Student
Value Correct Answer Feedback
Response
1. extended
2. secondary
3. primary
4. active 100%
Score: 2/2
A(n) ____ partition is created from space that is not yet partitioned.
Student
Value Correct Answer Feedback
Response
1. active
2. secondary
3. extended 100%
4. primary
Score: 2/2
A ____ volume is a portion of a disk or an entire disk that is set up as a dynamic disk.
Student
Value Correct Answer Feedback
Response
1. striped
2. simple 100%
3. mirrored
4. spanned
Score: 2/2
A ____ volume is stored on 2 to 32 dynamic disks that are treated as one volume.
Student
Value Correct Answer Feedback
Response
1. spanned 100%
2. mirrored
3. simple
4. striped
Score: 2/2
DNS name resolution is enabled through the use of tables of information that link computer names and IP
addresses. The tables are associated with partitions in a DNS server that are called ____ and that contain resource
records.
Student
Value Correct Answer Feedback
Response
1. regions
2. zones 100%
3. segments
4. blocks
Score: 2/2
In exclusive forwarding, the DNS server that initially forwards the request is called a ____ DNS server.
Student
Value Correct Answer Feedback
Response
1. master
2. secondary
3. root
4. slave 100%
Score: 2/2
____ automatically registers network clients that use NetBIOS and builds a database that other network clients
can query in order to locate a computer.
Student
Value Correct Answer Feedback
Response
1. NetBEUI
2. DDNS
3. DNS
4. WINS 100%
Score: 2/2
The WINS ____ registers the IP addresses and names of its client computers by writing them to the WINS
database.
Student
Value Correct Answer Feedback
Response
1. cache
2. server 100%
3. zone
4. record
Score: 2/2
A(n) ____ is a DNS resource record that links a computer or network host name to its IP address.
Student
Value Correct Answer Feedback
Response
1. load share
2. canonical
name
(CNAME)
3. host (A) 100%
4. MX
Score: 2/2
____ is a dual-key encryption standard for communication between a server and a client and is also used by
Microsoft Internet Explorer.
Student
Value Correct Answer Feedback
Response
1. WINS
2. DDNS
3. SSL 100%
4. NetBIOS
Score: 2/2
The ____ is a DNS resource record that associates a particular TCP/IP service to a server along with the domain
of the server and its protocol.
Student
Value Correct Answer Feedback
Response
1. SOA
2. SRV 100%
3. CNAME
4. NS
Score: 2/2
DNS servers on a network fall into two broad categories: ____ and secondary.
Student
Value Correct Answer Feedback
Response
1. home
2. primary 100%
3. root
4. active
Score: 2/2
A(n) ____ DNS server contains a copy of the primary DNS server’s zone database, but is not used for
administration (is not authoritative).
Student
Value Correct Answer Feedback
Response
1. virtual
2. extended
3. logical
4. secondary 100%
Score: 2/2
A ____ zone has only the bare necessities for DNS functions.
Student
Value Correct Answer Feedback
Response
1. forward
lookup
2. stub 100%
3. replication
4. reverse
lookup
Score: 2/2
____ networking, which has been around since before the Internet, means using a telecommunications line and a
modem (or other telephony device) to dial into a network or specific computers on a network.
Student
Value Correct Answer Feedback
Response
1. SLIP
2. Dial-up 100%
3. VPN
4. RRAS
Score: 2/2
____ translates IP addresses on an internal network so that the actual IP addresses cannot be determined on the
Internet, because each address is seen externally on the Internet as one or more decoy addresses.
Student
Value Correct Answer Feedback
Response
1. ISDN
2. X.25
3. NAT 100%
4. DSL
Score: 2/2
The ____ of a remote access policy are a set of attributes that are compared with the attributes of the connection
attempt.
Student
Value Correct Answer Feedback
Response
1. conditions 100%
2. constraints
3. access
permissions
4. settings
Score: 2/2
____ encapsulates the data packet in the Hypertext Transfer Protocol (HTTP) used through Web
communications.
Student
Value Correct Answer Feedback
Response
1. L2TP
2. PPTP
3. SSTP
4. PPP 0%
Score: 0/2
____ is a commonly used form of security for communications and transactions over the Web and can be used by
all Web browsers.
Student
Value Correct Answer Feedback
Response
1. SSL 100%
2. SLIP
3. PPTP
4. SSTP
Score: 2/2
A(n) ____ is a modem from which communications occur in discrete units, and in which the start of a unit is
signaled by a start bit at the front, and a stop bit at the back signals the end of the unit.
Student
Value Correct Answer Feedback
Response
1. cable modem
2. synchronous
modem
3. DSL modem
4. asynchronous 100%
modem
Score: 2/2
__ is a WAN communications technology that relies on packet switching and virtual connection techniques to
transmit at rates from 56 Kbps to 45 Mbps.
Student
Value Correct Answer Feedback
Response
1. DSL
2. T-carrier
3. Frame relay 100%
4. ISDN
Score: 2/2
____ policies are security measures set up in a group policy that applies to all accounts or to all accounts in a
container, such as a domain, when Active Directory is installed.
Student
Value Correct Answer Feedback
Response
1. Audit
2. Security
Options
3. User Rights
4. Account 100%
Score: 2/2
____ enable an account or group to perform predefined tasks.
Student
Value Correct Answer Feedback
Response
1. Account
locks
2. Account
logs
3. Account
audits
4. User rights 100%
Score: 2/2
____ can provide security for all TCP/IP-based application and communications protocols, including FTP and
HTTP, which are used in Internet transmissions.
Student
Value Correct Answer Feedback
Response
1. IPsec 100%
2. UAC
3. BitLock
Encryption
4. NAP
Score: 2/2