1. Which of the following wireless security standards uses AES, and is considered the MOST secure means of encryption?
A) A. Wireless Protected Access v2 B) B. Temporal Key Integrity Protocol C) C. Wired Equivalent Privacy D) D. Wireless Protected Access
2. For a wireless network configured to use WPA2 with AES encryption, which of the following is the MAXIMUM bit strength of the encryption?
A) A. 64 bits B) B. 128 bits C) C. 256 bits D) D. 1024 bits
3. Which of the following technologies uses a Cold Cathode Florescent Lamp Inverter to backlight the screen?
A) A. Plasma B) B. LCD C) C. LED D) D. OLED
4. Which of the following features allows an operating system to access multiple virtual processors?
A) A. Hyper threading B) B. Integrated GPU C) C. L2 cache D) D. Multiple cores
5. Which of the following characteristics is generally found on a docking station that port replicators do not offer?
A) A. Replicators usually have more USB ports than docks. B) B. Docks generally do not need separate power to function. C) C. Docks have independent hardware that replicators lack. D) D. Replicators have additional NIC that docks lack.
Leave a comment