CSS Knowledge-Based SET-A
1. ___________ is a network cable where one end is T568-A while the other is T568-B
Configuration.
a. Straight-thru
b. Roll-over
c. Cross-over cable
d. Extreme Feedback
2. It is a networking device that forward data packets between computer networks.
a. Wireless Access Point (WAP)
b. Hub
c. Router
d. Patch panel
3. Which of the following is not appropriate to enter BIOS setup
a.F2
b.F1
c.F10
d.F5
4. What enables users of Windows that correct any problems preventing from booting up
normally?
a.Safe mode
b.IPConfig
c.Task Manager
d.Disk cleanup
5. A utility tool that test whether a particular host is reachable across an IP Network.
a. Netstat
b. Dxdiag
c. Ping
d. Tracer
6. It is originally, Where the BIOS stored in a standard PC?
a. Solid State Drive (SSD)
b. Read Only Memory (ROM)
c. Random Access Memory (RAM)
d. Hard disk Drive (HDD)
7. A single physical hard drive can divide into multiple _______ Hard drives.
a.Single
b.Boot
c.Logical
d.Local
8. ______ Is a complete copy of everything store on a physical optical disc.
a. Stored file
b. Backup file
c. Memory map
d. ISO Image
9. _______ is a collection of devices connected together in one physical location.
a.Wide Area Network (WAN)
b.Local Area Network (LAN)
c.Metropolitan Area Network (MAN)
d.Campus Area Network (CAN)
10. What is the common color for the USB 3.0 connector Standard A receptacles and
plugs?
a.Black
b.Red
c.Blue
d.White
11. Wi-Fi is a trademarked phase, which means ________.
a.IEEE.803.11
b.IEEE.801.11
c.IEEE.804.11
d.IEEE.802.11
12. Where do Windows device drivers store?
a.Drivers and Settings
b.Computer
c.Hardware
d.Registry
13. What is the volt rating of the RED wire in a power supply?
a.-5V
b.-12V
c.+5V
d.+12V
14. What is the minimum requirement for hard disk drive capacity in Windows 10?
a.20 GB for 32-bit OS or 30 GB for 64-bit OS
b.30 GB for 32-bit OS or 40 GB for 64-bit OS
c.20 GB for 32-bit OS or 40 GB for 64-bit OS
d.16 GB for 32-bit OS or 20 GB for 64-bit OS
15. In windows 7, when LAN connection has a cross and red indicator signifies that there
is _______.
a.Emergency that needs attention
b.LAN update
c.Problem with the LAN driver
d.Virus in the LAN
16. What are the two types of interface use to communicate between the hard drive and
the computer motherboard?
a.Parallel Advance Technology Attachment (PATA) and Industry Standard Architecture
(ISA)
b.Advanced Technology Attachment (ATA) and Serial Advanced Technology
c.Advanced Technology Attachment (ATA) and Parallel Advanced Technology
d.Industry Standard Attachment (PATA) and Industry Standard Architecture (ISA)
17. _______ is a two or more PCs are connected and share resources without going
through a separate server computer.
a.Peer to Peer network
b.Client Server
c.Local Area Network
d.Personal Area Network
18. Which of the following hardware components can connect over a computer network?
a.Network Module Card
b.Network Driver
c.Network Hardware Card
d.Network Interface Card
19. What Starts up recovery options in a computer that essentially RECOVERY partition
of the main hard drive?
a.Safe Mode
b.System Restore
c.Command prompt
d.Repair Computer
20. What services in Windows Server that enables administrator to migrate data to a
lower-cost and tape media on file servers?
a.Remote Storage Service
b.File Screening Service
c.Data Compression Service
d.Volume Shadow Copy Service
21. What Application group that contains a Client Access Point and with at least one
application specific resource?
a.Virtual Cluster Server
b.Cluster resource
c.Active node
d.Cluster
22. What type of memory used in the Solid State Drive (SSD) as a storage?
a.Read Only Memory (ROM)
b.Static Random Access Memory (SRAM)
c.Flash Memory
23. A type of network that interconnects multiple local area network.
a.Local Area Network
b.Campus Area Network
c.Metropolitan Area Network
d.Wide Area Network
24. What IP address used by the virtual machine to communicate over the physical
network?
a.Provider Address
b.Private Address
c.Customer address
d.Internet Address
25. It occurs when an attacker or trusted insider steaks data from a computer system and
demands compensation for its return.
a.Malicious code
b.Information extortion
c.Threat
d.Theft
26. __Consist of the user matrices, and capability tables that govern the rights and
privileges of users.
a.Systems Management
b.Statement of Policy
c.Systems-Specific Policy
d.Access control list
27. It monitors the initial security accreditation of an information system for tracking of
changes.
a.Configuration Management
b.Network Monitoring
c.Measurement and Metrics
d.Continuous Assessment
28. What type of version that protects unauthorized network access by utilizing a set-up
password?
a.Wi-Fi Protected Setup (WPS)
b.WPA2-Enterprise
c.Temporal Key Integrity Protocol (TKIP)
d.WPA2-Personal
29. A computer program use to prevent, detect, and remove possible threats to the
system.
a. Scandisk Software
b. Anti-Virus Software
c.Defragment software
d.Direct Software
30. What is the spider-like interconnection in millions of pieces of information located on
computers around the cyber space?
a. Internet of Things (IOT)
b. Browser
c.World Wide Web
d.E-commerce
CSS Knowledge-Based SET-B
1. What IP address used by the virtual machine to communicate over the physical
network?
a.Internet Address
b.Provider address
c.Private Address
d.Customer address
2. _____ is used to store the user documents with a large amount of memory and storage
space.
a.Mail Server
b.Print Server
c.File server
d.Application Server
3. What software program stores into a Read Only Memory (ROM)?
a.Firmware
b.Driver
c.Flash IC
d.Power On Self Test (POST)
4. An Automated Software Program that executes certain commands when it receives a
specific input is ________.
a.Threat
b.Malicious code
c.Spyware
d.Bot
5. A compound used to prevent overheating of CPU.
a.Central Processing Unit (CPU) separator
b.Heat sink insulator
c.Interface sink
d.Thermal paste
6. _________ is a way to identify a specific process to which an Internet or other network
message forwarded when it arrives at a server.
a.IP address
b.Proxy Server
c.Port number
d.PING
7. What is the minimum hardware requirements of the computer RAM, for Windows 10?
a.1 gigabyte (GB for 32-bit or 2 GB for 64-bit
b.1 gigabyte (GB for 32-bit or 4 GB for 64-bit
c.4 gigabyte (GB for 32-bit or 4 GB for 64-bit
d.2 gigabyte (GB for 32-bit or 2 GB for 64-bit
8. Disc image also known as __________.
a.WIM Image
b.Installer image
c.ISO Image
d.Hard disk drive (HDD) Image
9. What Recovery Console Commands that writes a new master boot record on the hard
disk drive?
a.Bootrec
b.fixmbr
c.Bmrui
d.Chkdsk
10. ________ is a computer network made up of an interconnection of local area
networks (LANs) within a limited geographical area, e.g corporate buildings.
a.Wide Area Network
b.Campus Area Network
c.System Area Network
d.Metropolitan Area Network
11. An extension of Microsoft management console use to manage hardware devices
including device drivers.
a.Device Manager
b.Peripheral Manager
c.Console Manager
d.Hardware Manager
12. What is the volt rating of the YELLOW wire in a power supply?
a.-5V
b.-12V
c.+5V
d.+12V
13. Port _________is an application of network address translation (NAT) that redirects a
communication request from one address and port number combination to another.
a.Request
b.Forwarding
c.Evaluation
d.Standard
14. The Recovery Console Command that examines the volume for errors and repairs it.
a.Bootrec
b.Bootcfg
c.Chkdsk
d.Mbr
15. Light Emitting Diode (LED) in Network Interface Card (NIC) has ______ Lights.
a.3
b.4
c.2
d.1
16. What is the physically damage cluster of storage on the hard drive?
a.GUID Partition Table
b.Bad sector
c.Master Boot Record (MBR)
d.Volume
17. Who is assign to monitor the network security, operation and network users?
a.Encoder
b.End-User
c.Network Administrator
d.Network Technician
18. What storage device should replace if frequent error messages appear while moving
files and booting up operating system?
a.Hard Disk
b.Random Access Memory
c.Flash drive
d.Optical Drive
19. The computer system is functional if it is in ______.
a.Normal booting
b.Change option
c.Auto shut off
d.Good option
20. It occurs when two or more devices connected with the same IP address in a
computer network.
a.Static IP Address error
b.Dynamic IP Address conflict
c.Private IP Address error
d.IP Address conflict
21. What feature in Windows Server provides the ability to migrate workloads between a
source and target cluster?
a.Live Migration
b.Failback
c.Failover
d.Shared storage
22. What log files that record performance statistics based on the various performance
object and instances available in Performance Monitor?
a.Counter Logs
b.View Log File Data
c.Circular Logging
d.Linear Logging
23. What is the alternative for wired connection that uses radio frequencies to send
signals between devices and a router?
a.Wireless Fix
b.Wireless Firmware
c.Wireless Fidelity
d.Wireless Router
24. What term applies to the interconnection of LAN in a city into 5 to 50 kilometers?
Question 24Answer
a.Metropolitan Area Network
b.Campus Area Network
c.Wide Area Network
d.System Area Network
25. What is the maximum cable length for USB 2.0?
a.5 ft.
b.5 meters
c.1.2 yards
d.1.5 meters
26. In Server 2008, Local Area Network (LAN) connection icon in a yellow color
indicator it is signifies______?
a.Update
b.Virus
c.Driver problem
d.No Connectivity
27. ____________enables administrators to configure storage thresholds on particular
sets of data store on server NTFS volumes
a.File System Quota
b.Data Compression
c.FAT-formatted partition
d.Extensible File Allocation Table (xFAT))
28. What type of version that verifies network users through a server and requires a more
complicated setup, but provides additional security?
a.Wi-FI Protected Setup (WPS)
b.WPA2-Personal
c.Temporal Key Integrity Protocol (TKIP)
d.WPA2-Enterprise
29. What windows update that downloads and install latest version?
a.Fully automatic
b.Semiautomatic
c.Full updates
d.Check update
30. A Yost cable, Cisco cable, and a Console cable also known as __________.
a.Cross-over
b.Straight-Thru
c.Roll-over
d.Extreme
CSS Knowledge-Based SET-C
1. What Ethernet cable used to connect computers to hubs and switches?
a.Roll-over
b.Extreme
c.Cross-over
d.Straight-Thru
2. An ideal voltage range on the hotwires of a Molex connector?
a.Red=5V, yellow=12V
b.Red=12V, yellow=5V
c.Red=5V, yellow=3.3V
d.Red=3.3V, yellow=5V
3. A router that is design to operate in the internet backbone.
a.Bridge
b.Network
c.Edge
d.Core
4. Which of the following is the most efficient in transferring larger files?
a.Network Time Protocol (NTP)
b.Control Protocol
c.File Transfer Protocol
d.Hypertext Transfer Protocol
5. What kind of chip stores the settings in the BIOS?
a.Basic Input Output System Random Access Memory (BIOS RAM) Chip
b.Advanced Technology eXtended (ATX) Chip
c.Complementary Metal Oxide Semiconductor Read Only Memory (CMOS ROM)
d.Real Time Clock/Non Volatile Random Access Memory (RTC/NVRAM) Chip
6. What log files that conserves disk space by ensuring that the performance log file will
not continue growing over certain limits?
a.Circular Logging
b.Counter Logs
c.Linear Logging
d.View Log File Data
7. A network interface controller also known as ______.
a.WAP
b.Switch
c.Hub
d.LAN Card
8. ______ allows to define a list of devices and only allow those devices on WI-FI
network.
a.Service Set Identifier
b.Wireless Security
c.MAC Address Filtering
d.Wired Equivalent Privacy
9. The network security standard that tries to make connections between a router and
wireless devices faster and easier.
a.WPA2-Enterprise
b.WPS
c.TKIP
d.WPA2-Personal
10. A progress of scanning, identifying, diagnosing and resolving problems, errors and
bugs in software.
a.Software diagnostic
b.Software Troubleshooting
c.Testing
d.Debugging
11. What second clustering technology provides by corresponding client requests across
several servers with replicated configurations?
a.Quick Migration
b.Cluster quorum
c.Network Load Balancing
d.Hyper-V Virtualization
12. A task to do after planning to fix the network is __________?
a.Implementing the solution
b.Implementing the idea
c.Implementing the agreement
d.Implementing the result
13. What class of IP address is 192.168.0.1?
a.Class C
b.Class A
c.Class D
d.Class B
14. What technique use to gain unauthorized access to computers, wherein the intruder
sends messages with a source IP address?
a.Spam
b.Spyware
c.Sniffers
d.Spoofing
15. ___________ is an enterprise-level heterogeneous backup and recovery suite.
a.NetCopy
b.NetSave
c.NetBackup
d.NetFile
16. ____ Allows users to move around the coverage area in a line of sight while
maintaining a network connection.
a.Campus Area Network
b.Local Area Network
c.Wireless Local Area Network
d.Wide Area Network
17. What windows edition as a program capable of restricting other users to access
certain programs in a computer?
a.Windows basic
b.Windows Extreme
c.Windows Ultimate
d.Windows Professional
18. A ___________ should be upgraded to received and transmit strong signals to and
from other computers.
a.Video Card
b.Network Card
c.Sim Card
d.Memory Card
19. What is the problem of a computer if the time and date keeps on resetting even after
fixing in the BIOS?
a.Flash Memory failure
b.System cashing
c.CPU Overheating
d.CMOS battery failure
20. It is used as a substitute for actual disc, allowing users to run software without having
to loa a CD or DVD.
a.CMD File
b.Hyberfil File
c.Bootsys File
d.ISO file
21. It enables administrators to define the types of file that can save within a Windows
volume and folder.
a.File Screening
b.File Compression
c.File Classification Infrastructure
d.File Encryption
22. What type of network that connects through signals, e.g. infrared?
a.Wired Equivalent Privacy
b.Campus Area Network
c.Local Area Network
d.Wireless Security
23. M.2 is a form factor for _________.
a.Storage Drive
b.Motherboard
c.Memory
d.Power Supply
24. _____ is an information asset suffering damage, unintended modification or
disclosure.
a.Loss
b.Attack
c.Exploit
d.Exposure
25. In what folder that the device driver can be found?
a.Program file
b.System32
c.Registry
d.Drv
26. What command-line tool used to find IP addresses that corresponds to a host or
domain name?
a.Tracert
b.NSlookup
c.Ping
d.Ms DOS
27. A protocol that provides quick, automatic, and central management for the
distribution of IP addresses within a network.
a.Dynamic Host Control Protocol (DHCP)
b.Simple Mail Transfer Protocol (SMTP)
c.Transmission Control Protocol (TCP)
d.Domain Name System (DNS)
28. What is the maximum cable length for USB 3.0 using a non-twisted pair wire?
a.5 meters
b.4 meters
c.10 meters
d.3 meters
29. A tool used for checking the condition of the hard drive with signs like “Good”.
“Caution” or “Bad”.
a.Scandisk
b.Defragmented
c.Disk Management
d.Crystal Disk Info
30. A type of server that allows the central administration and management of network
users and network resources.
a.Database Server
b.Directory Server
c.Application Server
d.File Server
CSS Knowledge-Based SET-D
1. In networking, _______ refers to pieces of related information that are transferred
through a network.
a.Access
b.Connection
c.Wi-FI
d.Packet
2. Which of the following is a term for the main patch panel that links to every
telecommunication room inside the building?
a.Vertical cross-connect
b.Multiplexer
c.Lead extension
d.Major distribution line
3. _________ is a way to identify a specific process to which an Internet or other network
message forwarded when it arrives at a server.
a.Proxy Server
b.PING
c.IP address
d.Port number
4. What media types of 10-megabit Ethernet that compose of broadband coaxial cable
carrying multiple base band channels for a maximum length of 3,600 meters?
a.10BASE-5
b.10BASE-2
c.10BASE-36
d.10BASE-T
5. What active directory protocol used to access data from a database?
a.Dynamic Host Control Protocol (DHCP)
b.Lightweight Directory Access Protocol (LDAP)
c.Simple Mail Transfer Protocol (SMTP)
d.File Transfer Protocol (FTP)
6. In Windows 7, Windows update and security is located in _____.
a.Settings
b.System Performance
c.Programs
d.Device Manager
7. Which of the following displays the measures and various real-time statistics on the
system’s performance?
a.Counter Monitoring
b.View Current Activity
c.Counter Logs
d.View Log File Data
8. Minimum byte capacity of a bootable flash drive for Windows 10 is ____.
a.32GB
b.4GB
c.8GB
d.16GB
Feedback
9. What type of peripheral card having media access control address?
a.Tuner card
b.Network interface card
c.Firmware Card
d.Peripheral component interconnect card
10. ______ defined as a structured network cabling system standards for commercial
buildings, and between buildings in campus environments.
a.ANSI/TIA-567
b.ANSI/TIA-587
c.ANSI/TIA-568
d.ANSI/TIA-566
11. An enclosed or semi-enclosed channel that protects, routes and hides cables and
wires.
a.Panel
b.Holder
c.Rack
d.Raceway
12. A material that slid before crimping both ends of a patch cable and acts to reduce
strain in a cable.
a.Protector
b.Ring
c.Boot
d.Shield
13. Which of the following commands used to certify the peer name resolution in Active
Directory?
a.DCPROMO
b.DNSCMD
c.FORMAT
d.NSLOOKUP
14. ______enables administrators to configure storage thresholds on particular sets of
data store on server NTFS volumes
a.File System Quota
b.Data Compression
c.FAT-formatted partition
d.Extensible File Allocation Table (xFAT))
Feedback
15. What test verifies the operation of communication device by sending and receiving
data from the same port?
a.Data link test
b.Loopback test
c.Routing test
d.Signal test
16. ________ is a computer network made up of an interconnection of local area
networks (LANs) within a limited geographical area, e.g corporate buildings.
a.Wide Area Network
b.Campus Area Network
c.Metropolitan Area Network
d.System Area Network
17. It acts like a border router to connect corporate sites to wired access lines.
a.Product Terminal Equipment (PTE)
b.Virtual Control Equipment (VCE)
c.Customer Premises Equipment (CPE)
d.Network Transfer Equipment (NTE)
18. _________ is a process of recognizing a user’s identity.
a.Encryption
b.Identification
c.Authentication
d.Authorization
19. A network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
a.Media Access Control (MAC)
b.Firewall
c.Gateway
d.Group Policy
20. What term used to refer when a system is unavailable?
a.Recovery
b.Reliability
c.Unavailability
d.Downtime
21. What networking tool that monitor and intercepts traffic over the computer network?
a.Data link analyzer
b.Frequency analyzer
c.Packet analyzer
d.Protocol analyzer
22. _________ is a 24 pin USB connector system with a rotationally symmetrical
connector.
a.Universal Serial Bus (USB) C Thunderbolt
b.Extreme Universal Serial Bus (USB)
c.Super Universal Serial Bus (USB)
d.Ultra Extreme
23. What Class of IP addressing Is 172.168.10.1?
a.Class A
b.Class B
c.Class C
d.Class D
24. What type of a high-speed network/subnetwork that composed of hosts and
interconnects using a variety of technology/topology?
a.Campus Area Network
b.Local Area Network
c.Storage Area Network
d.Personl Area Network
25. Resistance reading of an open wire is _______.
a.10 Mega ohms
b.Zero ohm
c.Almost zero ohm
d.Infinite ohms
26. It facilitates communication between the CPU and other devices in the system.
a.Random Access Memory (RAM)
b.Bus
c.Chipset
d.Basic Input Output System (BIOS)
27. ___________ is used to store the user documents with a large amount of memory and
storage space.
a.Mail Server
b.Application Server
c.File server
d.Print Server
28. In the context of security, _______ is a privilege or assigned permission for the use of
computer data or resources.
a.Exploit
b.Attack
c.Asset
d.Access
29. What type of router that enables an internal network to connect to external network?
a.Edge
b.Forwarding
c.Core
d.Broadband
30. A type of server that occupies a large portion of computing territory between the
database server and end user.
a.Client server
b.File server
c.Application server
d.Directory server
CSS Knowledge-Based SET-E
1. _____Is the process of joining two cables ends together.
a.Cable splicing
b.Cable passing
c.Cable pressing
d.Cable conduiting
2. What is the traditional method used to access server data and using the server message
block protocol over TCP/IP?
a.System Management Tools
b.File System Monitoring
c.File Resource Manager Tools
d.Windows Folder Sharing
3. What two command-line utilities used to export and import Active Directory Object
Information?
a.Ping.exe and ping /all
b.Csvde and Set-ADComputer
c.AllUsers.ldf and objectclass=user
d.Ldifde.exe and csvde.exe
4. What command-line network utility that displays network connections for TCP and
routing tables?
a.Ping
b.Ipconfig
c.Netstat
d.Connections.txt
5. _______which means pushing component to its limits and extremes.
a.Logic Test
b.Interface Test
c.Stress Test
d.Technical Test
6. What is the minimum Random Access Memory (RAM) requirement of Server 2008
R2?
a.1GB
b.4GB
c.2GB
d.512MB
Feedback
7. A setup option in Unified Extensible Firmware Interface (UEFI)/Basic Input Output
System (BIOS) that allows security settings to perform such task as locating the device.
a.Remote PC On
b.LoJack
c.Tracker on
d.Wake on LAN
8. In Windows 7, an indicator tells that a video driver has not installed.
a.Displays bios setup only
b.Three short beeps
c.Only Standard video is displayed
d.NO video display
9. It ensures that information and programs are changing only in a specified and
authorized manner
a.Security
b.Integrity
c.Availability
d.Confidentiality
10. What type of backup used in hard drive, disc, flash drive and external drive that are
housed on site?
a.Local Backup
b.Full Backup
c.Incremental Backup
d.Differential Backup
11. It is the time lapse between data sent and when received, it can have a big impact on
performance.
a.Cycle
b.Gap
c.Latency
d.Delay
12. set of rules that describe how software and hardware should interact within a
network?
a.Communications protocol
b.Expanding The Network
c.Group Policy
d.Multihomed host
13. Set of rules for transferring files such as text, graphic images, sound, video and other
multimedia files, on the World Wide Web (WWW)
a.Accelerated File Transfer Protocol (AFTP)
b.Simple Mail Transfer Protocol (SMTP)
c.File Transfer Protocol
d.Hypertext Transfer Protocol(HTTP)
14. What class of IP addressing is 10.10.10.1?
a.Class B
b.Class C
c.Class A
d.Class D
15. What is a hardware device that enables to connect serial devices across a network?
a.Register Jack
b.Coaxial Cable
c.Terminal Server
d.Com Port
16. The most current wireless networking standard and can communicate with the older
network standards.
a.802.11g
b.802.11b
c.802.11n
d.802.11a
17. Which of the following electronic components need to discharge electrically before
the replacement of parts?
a.Capacitor
b.Resistor
c.Diode
d.Transistor
18. What attack includes the execution of viruses, worms, Trojan horses, and active Web
scripts with the intent to destroy or steal information?
a.Information Extortion
b.Malicious Code
c.Polymorphic
d.Bot
19. A node in a computer network that allows data to flow from one discrete network to
another.
a.Gateway
b.Router
c.Hub
d.Network Interface Card (NIC)
20. A device that acts as a bridge between wireless clients and wired network is___.
a.Broadband
b.Access Point
c.Router
d.Hub
21. ___is an interface standard for a serial bus for high-speed communications also
referred as Institute of Electrical and Electronics Engineers (IEEE) 1394 interface.
a.Firewire
b.Serial Advanced Technology Attachment (SATA)
c.Universal Serial Bus (USB)
d.Thunderbolt
22. A text based on command used for creating bootable flash drive.
a.Chkdsk
b.Boot
c.Format
d.Diskpart
23. _____used to run commands for troubleshooting unbootable operation system.
a.Windows Recovery Environment
b.Power On Self-Test
c.Windows Update
d.Master Boot Record
24. How many device can connect to a wireless router?
a.100
b.200
c.250
d.150
25. What recovery tool in Windows fixes and scans computer problem that prevents
computer from booting repeatedly?
a.Repair and update
b.Startup Repair
c.Boot sequence
d.Restore Point
26. A Volt meter reading of a shorted diode.
a.Zero volt
b.Almost zero volt
c.Half of the source voltage
d.Equal to its source voltage
27. A logical subnetwork that groups collection of devices from the same network switch.
a.System Area Network
b.Personal Area
c.Virtual Local Area Network
d.Enterprise Private Network
28. What electrical quantities measured when performing continuity testing of twisted
pair cable?
a.Inductance
b.Conductance
c.Resistance
d.Capacitance
29. What type of server that enables large numbers users to exchange information near
instantaneously and formerly known as Internet Relay Chat (IRC) Servers?
a.Directory Server
b.Server Platforms
c.Real-Time Communication Server
d.Proxy Servers
30. A microchip to manage data communication between a CPU and a motherboard.
a.Internal Controller Hub
b.Inclusive Controller Hub
c.Intersystem Controller Hub
d.Input/Output Controller Hub