Logomenu

Computer Skills Questions

Explore questions in the Computer Skills category that you can ask Spark.E!

What device is needed to connect subnets?

What is the powershell command used for running scripts on another machine on the network?

Is a horizontal bar with words at the top of the program window. When you click on a word a menu drops down.

To select a group of files at one time, select the first file, hold down the ______________Key on your keyboard, and then select the last file that you want to choose.

The ______________ is the bar at the bottom of a program that gives you information about the program

What is a potential drawback associated with the freedom provided by wireless networking?

What term describes a portion of the organization's network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?

Select multiple files for upload by holding the ___________ key (Mac or Windows) while selecting files.

Which layer of the OSI model corresponds to the Internet Layer in the TCP/IP protocol architecture?

In a scenario requiring full redundancy, what should devices have in terms of power supplies?

How many layers does the OSI model have?

What is a security solution installed on an endpoint to detect potentially anomalous activity?

What is the primary responsibility of the upper layer (host or application layer) in a network model?

What is a potential alternative to expensive dedicated point-to-point connections?

What does the NAC device provide for access security and incident response?

Endpoint <------> Web serverWhich port number is associated with the protocol typically used in this connection?

What is the common term used to describe the mechanisms that control the temperature and humidity in a data center?

Which cloud deployment model allows an organization to retain control of its IT environments, use public cloud services for non-mission critical workloads, and benefit from flexibility, scalability, and cost savings?

What information would be removed from a threat alert to maintain anonymity?

What is a common network device used to filter traffic?