answersLogoWhite

0


Best Answer

1 Which of the following is a public IP address?

192.168.200.14

2 Which of the following refers to a device that is logically addressed on an IP network?

Host

3 Which of the following are Network Devices?

HUB

Bridge

Router

Switch

4 Which physical network topology is the LEAST fault tolerant? (Choose all that apply)

The ring topology

The bus topology

5 A client on a Windows 2000 network cannot access resources on a Windows 2000 server because the DHCP server is down. The

client obtained an IP address. What IP address is the Client using?

169.254.X.X with a subnet mask of 255.255.0.0

6 There are several Broadcast storms in the network which is affecting the performance of it. Which devices would you

implement to reduce the traffic in the network ?

Switch

7 For which IP class range is 255.0.0.0 the default subnet mask?

Class A

8 What are the different tools you can use to troubleshoot -" No Dial Tone " issues when you are using a Dialup Modem?

Hyper Terminal

System Information

Device Manager

Query Modem

9 Which of the following is a valid Public IP address for an internet host?

56.144.226.123

172.192.4.254

239.168.11.21

12.24.12.0

10 Which of the following is the protocol used for transferring Web pages?

HTTP

11 Which of the following IP addresses have a default subnet mask of 255.255.0.0?.Select all that apply.

129.0.0.1

12 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?

Type the IP Address of the Server to contact the Website

13 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?

Transmission Control Protocol

14 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?

Check for a Firewall blocking access

Check for the subnet mask in both systems.

15 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?

The TCP/IP protocol is not functioning

16 When you map a drive over a network, the mapped drive acts as though it is another drive that is physically in your system.

True

17 Where can one find the option to Block Popups in IE 6?

Right click Internet Explorer icon -> Properties -> Privacy tab

Section : Threats

18 What does Virus stand for?

Vital Information Resource Under Siege

Section : Threats

19 What is TRUE for a WORM?

WORMS can self-replicate

It is a malicious program which enters a computer by travelling through security & network loopholes

Section : Threats

20 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.

Pharming

Section : Networking

21 Which of the following are Network Devices?

Router

Switch

HUB

Bridge

Section : Networking

22 Which of the following is a valid Public IP address for an Internet host?

56.144.226.123

Section : Networking

23 Wireless Zero Configuration is included from which Windows Operating system?

XP

Section : Networking

24 Which one of the following is required to connect an 11 Mbps wireless network that uses the 2.4 GHz frequency band based on the Wi-Fi certification standard?

802.11 b

Section : Threats

25 Which of the following would you use to access win.ini and system.ini in a notepad?

sysedit

Section : Threats

26 Many pieces of Adware can be uninstalled via Add/remove program.

False

Section : Threats

27 Why are Trojans hard to detect?

Because Anti Viruses cannot detect Trojans

Section : Threats

28 My Yahoo messenger application is blocked from communicating . Where do I go to enable the application?

Start--> ControlPanel--> Windows Firewall --> Exceptions

Section : Threats

29 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.

Pharming

Section : Threats

30 Where can one find the option to Block Popups in IE 6?

Right click Internet Explorer icon -> Properties -> Privacy tab

Section : Threats

31 What is TRUE for a WORM?

WORMS can self-replicate

It is a malicious program which enters a computer by travelling through security & network loopholes

Section : Networking

32 A system with IP Address 10.0.0.1 is trying to connect to a system with IP Address 192.168.0.1. In which scenarios would they connect to each other?

None of the mentioned answers

By deploying a Switch

By deploying a Bridge

By deploying a Hub

Section : Networking

33 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?

Transmission Control Protocol

Section : Networking

34 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?

Check for the Default Gateway

Check for a Firewall blocking access

Section : Networking

35 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?

The TCP/IP protocol is not functioning

Section : Networking

36 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?

Type the IP Address of the Server to contact the Website

Section : Networking

37 Wireless Zero Configuration is included from which Windows Operating system?

XP

Section : Networking

38 Which of the following statements is TRUE regarding the command line utility which should be run to check for any open Simple Mail Transfer Protocol (SMTP) sockets if you suspect a virus exists on the computer and e-mail no longer functions?

Wrong You should run the nslookup command line utility.

You should run the mode command line utility.

You should run the ipconfig command line utility.

You should run the netstat command line utility.

Section : Networking

39 You have a DSL Connection at home. Suddenly there is no Internet service on your PC. What would you do as a first few troubleshooting steps to connect to the Internet?

Wrong

Reset the Modem

Right Perform Ipconfig /release and then Ipconfig /renew

Section : Networking

40 Which of the following are points of failure for a DSL connection?

IP settings

DSL modem

NIC

Section : Networking

41 _____ is a logical address, used to identify computers in a network.

Subnet Mask

Default Gateway

IP address

Section : Threats

42 Which of the following best describes Rootkits?

A rootkit is a collection of tools (programs) that enable only remote desktop level access to a computer or computer network.

Section : Threats

43 The following are characteristics of AV(Anti-Virus) software EXCEPT that it will:

Delete an Infected File

Update a Definition automatically

Quarantine

Section : Threats

44 Which of the following are symptoms of Virus?

You cannot start Windows Task Manager.

Strange dialog boxes or message boxes appear onscreen

None of the mentioned answers

An antivirus program is disabled for no reason and it cannot be restarted.

Section : Threats

45 What is a adware?

Adware is a type of program that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.

Wrong Adware is neither a Hardware not Software that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.

None of the mentioned answers

Adware is a type of Hardware that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.

Section : Threats

46 What are the types of Firewall?

Software

Hardware

47 Section : Threats

Which of the following are manual threat removal?

Program Removal

Wrong Enable Firewall

Right File removal

48 Which of the following is the path for startup registry in win XP?

HKEY_CURRENT_USER\SYSTEM\Microsoft\Windows NT\CurrentVersion\

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

8y ago

This is sometimes referred to as "the Blue Screen of Death" or a "hard stop error".

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is another name for a blue screen error?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is another name for windows stop error?

Blue Screen Of Death


What is another name for a blue screen?

This is sometimes referred to as "the Blue Screen of Death" or a "hard stop error".


What is another name for a windows stop error?

Blue Screen Of Death or BSOD


Is the Blue Screen of Death a stop error?

Yup. That is the technical name of the Blue Screen of Death.


What is the name for windows stop error?

the blue screen of death


What is another name for a blue screen error which occurs when processes running in kernel mode encounter a problem ad Windows must stop the system?

Stop Error


What is another name for mesh screen?

another name for mesh screen is a sieve


What is another name for relative error?

You think probable to percent error.


What steps will you follow to identify the symptoms of the blue screen of death?

Well, first of all the Blue Screen of Death is not a disease for your computer. It itself is actually a symptom of a disease on your computer. Just like the human body can raise its temperature to fight a cold, the Blue Screen of Death activates to protect your computer from any harm to its more vital information. The Blue Screen of Death really doesn't cause death (It's official name is "Stop Screen"). It is a tool to protect your computer from harm and to provide an explanation for the disease or error that the computer encountered.


What is another name of a type you error?

Typo.


What is a name for a pc?

Another name for a PC screen is a monitor.


What is the another name for a windows stop error?

Standby