CompTIA A+ 4 Flashcards
What is a DMZ in a firewall/network?
A DMZ is an area just outside of a local network with external facing servers that can be accessed via the internet but NOT via the local network/LAN.
Usually for DNS, FTP, mail, proxy, web servers, VoIP.
Adds extra layer of security so hackers can’t access the local/internal network.
What is port forwarding?
Also called “port mapping,” port forwarding is directing traffic from the outside world to the appropriate server inside a local TCP/IP network.
What is LTE?
LTE is the technology behind 4G. It stands for Long Term Evolution.
LTE is faster than 3G but not quite up to the spec of 4G.
4G spec is 1000 Mbit down, and 500 up.
What is UTM?
Unified threat management, commonly abbreviated as UTM, is an information security term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions at a single point on the network.
A UTM appliance will usually include functions such as: antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak prevention. Some units also provide services such as remote routing, network address translation (NAT), and virtual private network (VPN) support.
What is an IDS?
Intrusion detection systems are used to detect anomalies with the aim of catching hackers before they do real damage to a network. They can be either network- or host-based. … Intrusion detection systems work by either looking for signatures of known attacks or deviations from normal activity.
What is an IPS?
An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
What is an end-point management server?
Good for security and because there are so many types of devices being used in the workplace these days.
You can monitor all infrastructure components, performance metrics (CPU, memory, disk space, uptime), processes and services, event logs, application and hardware changes, and more. The next-gen endpoint management solution helps IT teams discover, monitor and manage more than just traditional endpoints.
What are DHCP reservations?
Aka DHCP static lease.
Can be accessed inside your routers config.
Basically, getting a long lease on an IP address for your computer/device.
What is LoS communication/propagation?
Line-of-sight.
Means 2 devices that communicate with each other that can’t have anything in between.
Satellite and microwave technologies.
What is total throughout of Thunderbolt v3?
40 Gbit/s
What is total throughout of USB 3.1?
10 Gbit/s
Total throughout of SATA revision 2.0?
3 Gbit/s
Total throughout of Parallel ATA?
133 Mbit/s
What porotocol is used by Apple computers to locate music, photos, and other resources?
Bonjour
Which RAID type would require a full restore from a backup after a drive failure?
RAID 0.
In RAID 5, how many drives can you lose and still be operational?
One.
You can still be operational if you lose one.
In RAID 10, how many drives can you lose and still be operational?
Can lose all but one from each set of mirrors.
Where can you enable boot logs on windows?
In System configuration, go to Boot tab, and check the box for Boot Log.
Where can you find the boot log on a windows computer?
C:/Windows/ntbtlog.txt
What does holding the shift key when starting your computer do?
It stops the auto-start programs from starting up.
Where can you find the log files on Linux?
Individual application logs.
/var/log