The addition of impurities to an intrinsic semiconductive material.
DopingCorrect
The bias wherein the negative side of external voltage is connected to the n region of the diode and its positive side is connected to the p region.
Forward BiasCorrect
The bias wherein the positive side is connected to the p region and the negative side of external voltage is connected to the n region of the diode.
Reverse BiasCorrect
The bias wherein the positive side of external voltage is connected to the n region of the diode and its negative side is connected to the p region.
Reverse BiasCorrect
The circuit wherein the during the negative alternation of the ac input voltage, the diode is reverse-biased and there is no current.
Full-wave rectifierCorrect
The condition that allows current through the pn junction
Forward BiasCorrect
The configuration that has high input impedance and low output impedance.
Common Collector ConfigurationCorrect
The connection wherein the negative terminal of the source is connected to the anode side of the circuit and the positive terminal is connected to the cathode side.
Reverse-bias connectionCorrect
The depletion region is created by
DiffusionCorrect
The differential dc voltage required between the inputs to force the output to 0 V.
Input offset voltageCorrect
The following are examples of trivalent atoms except ___________,
CarbonCorrect
The four terminals of SCS.
Cathode gate, anode gate, anode and cathodeCorrect
The fuse rating that must be used
should be at least 20% larger than the calculated Ipri.Correct
The ideal diode model is represented like a/an __________.
simple switchCorrect
The inventor of Shockley diode.
William ShockleyCorrect
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
DDoSCorrect
The JFET always operates with the gate-source on junction _____________.
The limit of external reverse-bias voltage wherein the reverse current will drastically increase.
Breakdown voltageCorrect
The majority carriers in an p-type semiconductor are
HolesCorrect
The meaning of MOSFET.
Metal Oxide Semiconductor Field Effect TransistorCorrect
The n region of the diode.
CathodeCorrect
The p region of the diode.
AnodeCorrect
The process of adding impurities is called ___________.
DopingCorrect
The process of imparting impurities to an intrinsic semiconductive material in order to control its conduction characteristics.
DopingCorrect
The resistance from the output.
Output impedanceCorrect
The reverse voltage is ____________ in practical diode model.
equal to bias voltageCorrect
The SCS means ________________.
Silicon controlled switchCorrect
The smallest particle of an element that possesses the unique characteristics of that element.
AtomCorrect
The surge current initially occurs during ________.
The first turn on of the powerCorrect
The three terminals of SCR.
Anode, cathode and gateCorrect
The total resistance between the base terminals.
Interbase resistanceCorrect
The transistor configuration that has a 180 out of phase relationship.
Common Emitter ConfigurationCorrect
The two basic methods to turn off the SCR.
Anode current interruption and forced commutationCorrect
The two main types of field effect transistor.
JFET and MOSFETCorrect
The two types of JFET.
N-channel and P-channelCorrect
The value of barrier potential of a diode.
0.7 VCorrect
The value of the forward voltage in practical diode model.
0.7 VCorrect
The value of the voltage gain of a Common Base Configuration.
Low (WRONG)Correct
The VGS must be __________ to have channel conductivity in n-channel E-MOSFETS in enhancement mode,
PositiveCorrect
These are family of devices constructed of four semiconductor layers.
ThyristorsCorrect
These are the two types of JFET.
N-channel and P-channelCorrect
This term refers to the depletion region formed in the channel of a FET because of the voltage imposed on the gate.
Field-effectCorrect
To have channel conductivity in n-channel E-MOSFETS in enhancement mode, The VGS must be __________.
PositiveCorrect
True or False?An employee does something as a company representative with the knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action.
trueCorrect
Two basic methods to turn off the SCR.
Anode current interruption and forced commutationCorrect
Type of MOSFET that can operate in either enhancement mode or depletion mode.
Depletion MOSFETCorrect
Type of MOSFET that operates only in enhancement mode.
Depletion MOSFET (WRONG)Correct
What action will an IDS take upon detection of malicious traffic?
create a network alert and log the detectionCorrect
What are the terminals of SCS?
Cathode gate, anode gate, anode and cathodeCorrect
What are the terminals of UJT?
Emitter, base 1 and base 2Correct
What are three methods that can be used to ensure confidentiality of information? (Choose three.)
data encryption username ID and password two factor authenticationCorrect
What are two objectives of ensuring data integrity? (Choose two.)
Data is unaltered during transit. Data is not changed by unauthorized entities.Correct
What are two security implementations that use biometrics? (Choose two.)
voice recognition fingerprintCorrect
What does SCS means?
Silicon controlled switchCorrect
What does UJT means?
Unijunction transistorCorrect
What happens to the depletion region during forward bias?
NarrowsCorrect
What is a reason that internal security threats might cause greater damage to an organization than external security threats?
Internal users have direct access to the infrastructure devices. Correct
What is an example of “hacktivism”?
A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill. Correct
What is an example of the a Cyber Kill Chain?
a planned process of cyberattackCorrect
What is another name for confidentiality of information?
privacyCorrect
What is called to a diode clamper which inserts a negative dc level in the waveform?
Negative clamperCorrect
What is one main function of the Cisco Security Incident Response Team?
to ensure company, system, and data preservationCorrect
What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network?
Place all IoT devices that have access to the Internet on an isolated network.Correct
What is the best method to avoid getting spyware on a machine?
Install software only from trusted websites.Correct
What is the best method to prevent Bluetooth from being exploited?
Always disable Bluetooth when it is not actively used. Correct
What is the last stage of the Cyber Kill Chain framework?
malicious action Correct
What is the main purpose of cyberwarfare?
to gain advantage over adversaries Correct
What is the meaning of JFET?
Junction field-effect transistorCorrect
What is the most common goal of search engine optimization (SEO) poisoning?
to increase web traffic to malicious sitesCorrect
What is the motivation of a white hat attacker?
discovering weaknesses of networks and systems to improve the security level of these systems Correct
What is the purpose of a rootkit?
to gain privileged access to a device while concealing itself Correct