CompTIA A+ 4 Flashcards

1
Q

What is a DMZ in a firewall/network?

A

A DMZ is an area just outside of a local network with external facing servers that can be accessed via the internet but NOT via the local network/LAN.

Usually for DNS, FTP, mail, proxy, web servers, VoIP.

Adds extra layer of security so hackers can’t access the local/internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is port forwarding?

A

Also called “port mapping,” port forwarding is directing traffic from the outside world to the appropriate server inside a local TCP/IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is LTE?

A

LTE is the technology behind 4G. It stands for Long Term Evolution.

LTE is faster than 3G but not quite up to the spec of 4G.

4G spec is 1000 Mbit down, and 500 up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is UTM?

A

Unified threat management, commonly abbreviated as UTM, is an information security term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions at a single point on the network.

A UTM appliance will usually include functions such as: antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak prevention. Some units also provide services such as remote routing, network address translation (NAT), and virtual private network (VPN) support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an IDS?

A

Intrusion detection systems are used to detect anomalies with the aim of catching hackers before they do real damage to a network. They can be either network- or host-based. … Intrusion detection systems work by either looking for signatures of known attacks or deviations from normal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an IPS?

A

An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an end-point management server?

A

Good for security and because there are so many types of devices being used in the workplace these days.

You can monitor all infrastructure components, performance metrics (CPU, memory, disk space, uptime), processes and services, event logs, application and hardware changes, and more. The next-gen endpoint management solution helps IT teams discover, monitor and manage more than just traditional endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are DHCP reservations?

A

Aka DHCP static lease.

Can be accessed inside your routers config.

Basically, getting a long lease on an IP address for your computer/device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is LoS communication/propagation?

A

Line-of-sight.
Means 2 devices that communicate with each other that can’t have anything in between.

Satellite and microwave technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is total throughout of Thunderbolt v3?

A

40 Gbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is total throughout of USB 3.1?

A

10 Gbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Total throughout of SATA revision 2.0?

A

3 Gbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Total throughout of Parallel ATA?

A

133 Mbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What porotocol is used by Apple computers to locate music, photos, and other resources?

A

Bonjour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which RAID type would require a full restore from a backup after a drive failure?

A

RAID 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In RAID 5, how many drives can you lose and still be operational?

A

One.

You can still be operational if you lose one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In RAID 10, how many drives can you lose and still be operational?

A

Can lose all but one from each set of mirrors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where can you enable boot logs on windows?

A

In System configuration, go to Boot tab, and check the box for Boot Log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Where can you find the boot log on a windows computer?

A

C:/Windows/ntbtlog.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does holding the shift key when starting your computer do?

A

It stops the auto-start programs from starting up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where can you find the log files on Linux?

A

Individual application logs.

/var/log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Where can you find the logs on a Mac?

A

Utilities / Console.app

23
Q

What is TPM?

A

Used for full disk encryption.

Trusted Platform Module.

Built into many motherboards.

Can be added to others.

24
Q

What software does windows use for disk encryption?

A

Windows Bitlocker disk encryption.

Integrates with TPM.

25
Q

What is ASL?

A

Apple system log.
- all logs go thru here.

Started with leopard or snow leopard.

26
Q

What is IDE?

A

Integrated drive electronics.

IDE is an interface standard for connection of storages devices such as Hard Disk Drives (HDD), Solid State Drives (SSD) and CD/DVD drives to the computer.

27
Q

What is secure boot?

A

Secure Boot is one feature of the latest UEFI.

When enabled and fully configured, Secure Boot helps a computer resist attacks and infection from malware. Secure Boot detects tampering with boot loaders, key operating system files, and unauthorized option ROMs by validating their digital signatures.

  • checks for a digitally signed OS.
  • sometimes need to turn off.
28
Q

What is KVM?

A

Kernel-based Virtual Machine (KVM) is an open source virtualization technology built into Linux®. Specifically, KVM lets you turn Linux into a hypervisor that allows a host machine to run multiple, isolated virtual environments called guests or virtual machines (VMs). KVM is part of Linux.

29
Q

What does collate mean?

A

Print Basics. The meaning of the word collate is to collect, arrange and assemble in a specific order of sequence. In printing terminology, it is to assemble multiple sheets or parts together to create a set.

30
Q

What is FQDN?

A

Fully-qualified domain name.

31
Q

A drive in a RAID 10 array has failed, what would be the best way to correct this issue?

A

Replace the drive and sync to the new drive.

SATA drives are hot-swappable.
- no need to power down.

32
Q

What is PRL?

A

Preferred roaming list.

33
Q

What form factor does the USB 3.0/3.1 Micro B connector have?

A

It looks like 2 thin trapezoids with a line connecting them in the middle.

34
Q

Thunderbolt 3 throughput?

A

40 Gbits

35
Q

SATA Revision 3.0 throughput?

A

6 Gbits

36
Q

USB 3.0 throughput?

A

5 Gbits

37
Q

FireWire800 throughput?

A

800 Mbits

38
Q

In a RAID 0 array, if a single drive fails, is data still available?

A

No.

39
Q

List the six steps in the best practice methodology.

A
  1. Identify the problem
    - question user, perform backups
    - inquire regarding changes
    - review logs
  2. Establish a theory of probable cause
    - conduct research
  3. Test the theory
    - once theory confirmed, make next steps
    - if not, make new theory
  4. Establish a plan of action and implement
  5. Verify full system functionality
    - if can, implement preventive measures
  6. Document outcomes
40
Q

What are lumens?

A

A measurement of total light output.

41
Q

What is an ADF?

A

Automatic document feeder.

Can place a stack of paper into the tray and all will go through it and then can print, scan or copy but don’t have to scan one at a time like a flatbed scanner.

42
Q

What is an mITX?

A

Mini ITX.
6.7x6.7in

Uses ATX mounting holes.
4 mounting holes.

43
Q

In order to get 4K at 60fps, what version of hdmi do you need?

A

HDMI 2.0
- and a compatible cpu.

Not 1.4

44
Q

What happens if a RAID 5 loses 2 drives?

A

Data loss

45
Q

What is the maximum storage capacity of a DVD-RW DL (dual layer)?

A

8.5 GB

46
Q

What is the maximum storage capacity of a Blu-ray SL (single layer)?

A

25 GB

47
Q

What is an SAN?

A

A storage area network.

Similar to a NAS. (Network attached storage).

48
Q

What is Windows Printer Sharing?

A

Allows a windows computer connected to a printer to act as a print server.

49
Q

What do you call a power supply that switched between different voltages automatically? (For different countries’ outlets)

A

Auto-switching.

50
Q

What is a KVM switch?

A

A keyboard video mouse switch.

51
Q

Barcode scanners typically use what wireless technology?

A

802.11

52
Q

Total throughout of Thunderbolt v2?

A

20 Gbits

53
Q

Total throughout of USB 2.0?

A

480 Mbits