Comptia A+ 1001 Vocab Flashcards

1
Q

Tethering

A

the linking of a computer or other device to a smartphone in order to connect to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA encryption

A

Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WPA2 encryption

A

WPA2 (Wi-Fi Protected Access 2) is an encrypted security protocol that protects internet traffic on wireless networks. The second-generation of the Wi-Fi Protected Access security protocol, WPA2 addresses earlier flaws and offers more powerful encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UPnP

A

Universal Plug and Play
Universal Plug and Play (UPnP) is a standard that lets network devices automatically find, communicate with and control each other. It is used by routers, computers, printers, game consoles and IoT devices. It uses industry standard protocols such as IP, HTTP and Extensible Markup Language. It is designed for home use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC filtering

A

MAC address filtering allows you to block traffic coming from certain known machines or devices. The router uses the MAC address of a computer or device on the network to identify it and block or permit the access. Traffic coming in from a specified MAC address will be filtered depending upon the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

blocklisting

A

A blocklist (also known as a blacklist) is a list of items in a set that are not accepted. In computer security, a blocklist may be used to exclude which set to detect, quarantine, block, or perform security scans on. This list is exclusionary, confirming that the item being analyzed is not acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infrastructure mode

A

Infrastructure mode is a wireless network framework that has a central WLAN access point / router at the heart of the network. In infrastructure mode, wireless devices communicate with each other through an WLAN access point/router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QoS

A

Quality of service (QoS) is the use of mechanisms or technologies that work on a network to control traffic and ensure the performance of critical applications with limited network capacity. It enables organizations to adjust their overall network traffic by prioritizing specific high-performance applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NFC

A

Near Field Communication (NFC) is a set of short-range wireless technologies, typically requiring a distance of 4 cm or less to initiate a connection. NFC lets you share small payloads of data between an NFC tag and an Android-powered device, or between two Android-powered devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IR

A

Information retrieval, the science of searching for information in or as documents or databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LTE

A

LTE stands for Long Term Evolution and is sometimes referred to as 4G LTE. It’s a standard for wireless data transmission that allows you to download your favorite music, websites, and video really fast—much faster than you could with the previous technology, 3G.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PCIe

A

What is PCIe or PCI Express? PCIe is short for “peripheral component interconnect express” and it’s primarily used as a standardized interface for motherboard components including graphics, memory, and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISA

A

An Instruction Set Architecture (ISA) is part of the abstract model of a computer that defines how the CPU is controlled by the software. The ISA acts as an interface between the hardware and the software, specifying both what the processor is capable of doing as well as how it gets done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AGP

A

Accelerated Graphics Port (AGP) is defined as a hardware interface designed to connect a graphics card, video card, or 3D accelerator to a computer system to speed up 3D video output. This article explains the fundamentals of AGP, its key characteristics, uses, and advantages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud file services

A

Cloud file storage is a method for storing data in the cloud that provides servers and applications access to data through shared file systems. This compatibility makes cloud file storage ideal for workloads that rely on shared file systems and provides simple integration without code changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virtual desktop

A

A virtual desktop is a preconfigured image of operating systems and applications in which the desktop environment is separated from the physical device used to access it. Users can access their virtual desktops remotely over a network.

17
Q

Off-site email

A

Offsite email services are services provided by those that specialize in email systems such as Office365, GSuite and Microsoft Exchange. They can be used with any of EPhost’s plans whether it be Windows or Linux hosting.

18
Q

Resource pooling

A

In resource management, pooling is the grouping together of resources (assets, equipment, personnel, effort, etc.) for the purposes of maximizing advantage or minimizing risk to the users. The term is used in finance, computing and equipment management.

19
Q

BSOD

A

A BSOD is a full system failure at the Windows kernel level due to an issue with Windows drivers and/or hardware

20
Q

ipconfig

A

Internet Protocol CONFIGuration) A command line utility that is used to display and manage the IP address assigned to the machine. In Windows, typing ipconfig without any parameters displays the computer’s currently assigned IP, subnet mask and default gateway addresses.

21
Q

IP address

A

a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.

22
Q

subnet mask

A

A subnet mask is a number that distinguishes the network address and the host address within an IP address. A subnet is a smaller network within a network that requires a subnet mask. Subnetting is the process of dividing a network into two or more subnets.

23
Q

Default gateway

A

The default gateway is the path used to pass information when the device doesn’t know where the destination is. More directly, a default gateway is a router that connects your host to remote network segments. It’s the exit point for all the packets in your network that have destinations outside your network.

24
Q

netstat -nbt

A

The netstat command is used to show network status. Traditionally, it is used more for problem determination than for performance measurement. However, the netstat command can be used to determine the amount of traffic on the network to ascertain whether performance problems are due to network congestion.

25
Q

netsh int ip reset

A

These registry keys are used by the TCP/IP protocol stack; running the netsh int ip reset command is essentially equivalent to removing and reinstalling the TCP/IP stack. By the way, you could save the output of the reset command to a file using the netsh int ip reset > d:\ip_reset_log. txt command.

26
Q

ipconfig /flushdns

A

ipconfig /flushdns will flush the local computer cache. And dnscmd /clearcache will clear the dns server cache. With the former you will clear the “local” cache of the server you work on.

27
Q

nslookup

A

Nslookup is the name of a program that lets users enter a host name and find out the corresponding IP address or domain name system (DNS) record. Users can also enter a command in nslookup to do a reverse DNS lookup and find the host name for a specified IP address.