Questions from Troubleshooting


Q: Mary’s company routinely labels data according to its sensitivity or potential danger

Mary’s company routinely labels data according to its sensitivity or potential danger to the company if someone outside accesses the data. This is an example of_____________.

See Answer

Q: A virus that changes its signature to prevent detection is called a

A virus that changes its signature to prevent detection is called a(n)_______________ .

See Answer

Q: A(n) ______________ handles the video processing chores in modern

A(n) ______________ handles the video processing chores in modern systems.

See Answer

Q: The _______ version of Ethernet runs at 100 Mbps.

The _______ version of Ethernet runs at 100 Mbps.

See Answer

Q: A single piece of installed horizontal cabling is called a(n

A single piece of installed horizontal cabling is called a(n)______________ .

See Answer

Q: Ethernet cables typically use a(n) _________ connector.

Ethernet cables typically use a(n) _________ connector.

See Answer

Q: The most common Ethernet topology is__________ .

The most common Ethernet topology is__________ .

See Answer

Q: Most Ethernet networks use copper UTP wiring, but a(n

Most Ethernet networks use copper UTP wiring, but a(n) _________ enables much greater distance between two hosts.

See Answer

Q: Most Ethernet networks have a central box called a(n)_________

Most Ethernet networks have a central box called a(n)_________ .

See Answer

Q: All NICs have a unique identifier called a(n)______________ .

All NICs have a unique identifier called a(n)______________ .

See Answer