Comptia A+ (anki) Flashcards
A __ is where you store data permanently
hard drive
The three main components of the ___ are the controller, hard disk, and host bus adapter
hard drive
Each disk on hard disk is called a
Platter
Platters have a
top surface and bottom surface
If you had three platters then you have __ writeable surfaces, two for each platter
six
The more __ help increase the capacity of the hard drive
platters
The most common type of interface for hard drives are
Serial ATA (SATA)
The ___ controls all the operations of the hard drive. It controls all the moving parts. It handles how the data itself is encoded onto platters
controller
The ___ is a translator converting signals from the computer into the electrical signals that can be written on the disk and then vice versa it converts the electrical signals into data that the computer can understand
Host Bus Adapter (HBA)
The computer understands ___ or bits, a one, or a zero
Binary digits
Devices that in any way hold ones and zeros that the CPU accesses are known generically as ___
memory
The three connections for ___ are USB, Bluetooth, and PS/2
mice
For an advanced gaming mouse or something for 3D graphics you can __
update drivers
The __ on control panel applet is the way you want the pointer to appear
pointer options
On the control panel applet you can use the __ to set up right handed/left handed, how many pages it might scroll when you scroll the wheel
button configuration
A __ is the primary method for inputting data into a PC
keyboard
The three connections for a __ are USB, PS/2, Bluetooth
keyboard
The two connections for scanners are USB and
wireless
The form factors of a ___ are All in one (multfunctional) and flatbed
scanner
__ retrieve and/or store data on optical discs
Optical drives
__ are written to and read from using a laser
Optical drives
__ are commonly used for personal identification, access control, authentication, and financial transactions
Smart card readers
__ can be external (usb) or built in
Smart card readers
Mice, keyboard, scanners, optical drives, smart card readers, are examples of __
input devices
__ connects you to the internet and eliminates the need to use cables
USB Wifi Adapter
__ cards are built into computer system and help connect to the internet
Wireless
Some older laptops might use a ___ connection to connect to internet
Mini PCI
__ is square in shape and has a 124 pin edge connection
Mini PCI
A __ offers spreads of 802.11g and 802.11b
Mini PCI
Newer laptops use __ wireless cards to connect to the internet
Mini PCI Express
A __ has a 54 pin edge connection and is rectangular in shape. They have speeds of 802.11a, 802.11b, 802.11g, and 802.11n
Mini PCI Express
__ card allows you to connect your laptop to the internet using a cellular signal
Cellular
__ Screens are input and output devices
Touch
A __ allows multiple computers to share a single keyboard, video output, and mouse
KVM
Different KVM models can accommodate various interface types like USB, VGA, and __
DVI
The connections of speakers are __ Jack
TRS (Tip, Ring, Sleeve)
The __ is the most common computer output device
Screen
The various connections for a laptop to connect to another laptop of display are _____
VGA, DVI, HDMI
5 connection types for printers are __
USB, Ethernet, 802.11 (wifi), Bluetooth, Infrared
KVM, speakers, display devices (screen), projectors, printers are all __ devices
output
On the hardrive the __ is the axis around which the platters spin
spindle
On the hard drive, the __ is the read/write point. That is where the electrical charges are applied and/or read
head
On the hard drive, the __ moves the head back and forth, so it can access any position on the platter
arm
In the hard drive, the __ is the point about which the arm rotates
actuator axis
In the hard drive, the __ are the power and the data cable to connect it to the rest of the system
connections
In the hard drive, the __ is the motor that moves the arm back and forth
acutator
__ hard disks are the primary storage of most desktop computers
Magnetic
The benefits of a __ hard disk are mature, reliable, and relatively inexpensive
magnetic
__ hard disks are magnetic fields to store data
magnetic
The three magnetic disks size are ___
1.8 in, 2.5in, and 3.5 in
The __ inch hard disk is not widely used
1.8
The most widely used hard disk size is the __ inch which is used in laptops or portable external drives
2.5
The __ inch hard drive disk is the mainstream type used in PCs
3.5
SSD
Solid State Drive
The __ has no moving parts. It uses nonvolatile (does not require power to retain its data) NAND flash memory for storage. NAND is NON-AND refers to a logical processing mechanism
Solid State Drive
RAM is often referred to as simply __
System Memory
__ uses traditional platters along with high speed flash memory
Hybrid drives
__ are a combination of HDD capacity with SSD speeds
Hybrid drives
RAM is very __ because there are no moving parts. It is also volatile which mean it requires power
fast-access
RAM
Random Access Memory
The benefits of __ are that they cost less than SSD, greater capacity than SSD, performance is between
hybrid drives
SODIMMs are __ to __ inches in size
2.5 to 3
__ is a smaller version of the DIMM modules that are used in desktops
SODIMM
SODIMM
Small Outline DIMM (Dual in-line-memory module)
Laptops use __ memory
SODIMM
RAM is physical storage that also __ storage
temporary
Memory modules from different vendors __ be mixed
can
Before trying to upgrade the memory on a laptop, you must first consult the ___
motherboard user guide
The __ on the SODIMM are the point of contact to the socket it sits in the laptop itself
pins
Before upgrading laptop memory, you must determine how much memory you are conveniently using by going to __ in windows
task manager or resource monitor
VGA, DVI, S-Video, HDMI, Display Port, Composite video, and component video are all numerous interfaces of __
video cards
CRT
Cathode Ray Tube
A __ or CRT monitor contains a large cathode ray tube, uses a electron gun behind the screen that activates phosphors. They are becoming obselete
Cathode Ray Tube
LCD
Liquid Crystal Display
__ are commonly used in laptop computers and flat panel monitors. They produce clear images and replaced traditional CRT monitor
LCD
In-plane switching (IPS) panel technology super plane to line switching (PLS) Vertical Alignment (VA) panel technology and Twisted Nematic (TN) panel technology are all different ___ technologies
LCD
OLED
Organic light-emitting diode
__ is a thin display technology. It does not require back lighting. It uses organic compounds for electroluminescence
OLED
The different types of OLED are ___ and __
Passive Matrix OLED (PMOLED) and Active Matrix OLED (AMOLED)
Cathode Ray Tube (CRT), Liquid Crystal Display (LCD), Organic Light-Emitting Diode (OLED) are all types of __
displays
__ are often wrapped around the laptop display screen by placing the cable around the frame, it can be better withstand constant opening and closing of the screen. It performs better if located in the top part of the lid
Wi-fi Antennas
For __ image quality resolution is measured in pixels. The higher the frame rate means a smoother video. 2 million pixels is good. 30 frame rate is good.
webcams
CCFL
Cold Cathode Fluorescent Light
__ is lighting technology commonly used with LCD monitors, neon signs, computer case lighting. They are common in earlier LCD screens. They weigh more and use more power than LEDs. For every one you needed in inverter
CCFL
LED
Light Emitting Diodes
__ are a semiconductor device that emits visible light. They are commonly used in LCD panel backlighting, fiber optic data transmission, and indicator lights
LED
__ are any type of device that can produce a digital result from a non-digital input. It creates a digital representation based on analog information. They use styles or finger to determine position.
ex. tablet or smartphone
Digitizers
__ is a video interface that can carry both video and audio information
HDMI
__ allows you to connect multiple peripheral items. Items can include regular sized keyboard, mouse, external monitor, printer, USB drives, and speakers
Docking stations
The three modes of docking are ___
cold, warm, and hot
__ docking is when a laptop must be powered off
cold
__ docking is when the laptop must be put in an taken out of suspended mode
ex. sleep mode
warm
__ docking is when the laptop can recognize changes while running normal operations
hot
__ provides additional functionality to a laptop. It can be used because some laptops do not contain ports such as keyboard, mouse, and DVI.
Usually smaller, lighter, and much more portable than docking station
Port Replicator
__ can be connected via parallel, serial, USB, and SCSI USB is most common
Port Replicator
__ can provide a means of converting connection types
ex. Micro DVI to a regular DVI connection
Port Replicators
__ is the location in which laptop cable locks are secured. The other end of the cable is secured to a permanent anchored fixture
ex. wall or desk
Lock Port
Devices that can be used as a laptop and tablet are called __
2 in 1 devices
The two types of 2 in 1 devices are __ tablet
one piece and detacable
2 in 1 device are equipped with both a __
removeable touch screen and physical keyboard
__ screens can rotate. Most can rotate 360 degrees
convertible
A _ is a mobile device that is a mobile version of an operating system. They have a LCD touchscreen and rechargeable battery. They are smaller than a notebook but larger than a smartphone
tablet
Fitness monitors have an _ display
OLED
The three types of USB connections are _
Micro-USB, Mini-USB, and USB-C
The _ carries the fastest protocol, USB 3.1 physical connector has no orientation. It can be input either way
USB-C
The _ is Apple proprietary, has 8 pins, and a higher power output
ex. iphone
lighting cable
_ are vendor specific ports. They are unique to the device.
ex. apple products, Macbook air, pro
Mag safe - charging ports for Macbooks
Proprietary ports
NFC
Near-Field Communication
_ is a form of contactless communication commonly used between devices like smartphones and tablets. It can transfer video, contact info, photos, and payments
ex. Apple pay
NFC
_ is a short range wireless communication technology between devices. It is used to transmit data or voice wirelessly over short distances. It can be used on mobile phones, computers, peripherals. You must pair two devices
Bluetooth
_ is common remote controls. Uses invisible portion of light spectrum for signaling and communication. Devices can communicate at a distance of about three or four feet. You need to have direct line of sight to have clear signal
Infared
_ is a method for sharing internet connection from one device to another. It can be done over wifi, bluetooth, or USB cable. Device acts as a modem. Ideal when no alternative connections
old term for personal hotspot
Tethering
The three types of SD cards are _
SD, Mini SD, and Micro-SD
Mutual authentication for multiple services is also as known as _
Single Sign On (SSO)
_ is when both parties have to be satisfied that the other party is who they claim to be
Access control method
Users sign in once to access multiple services
Common in enterprise networks like email, database, document management applications
ex. online banking
Mutual Authentication for Multiple Services (SSO)
GSM
Global System for Mobile Communication
For connectivity cell phones use _, its networks consist of devices like gateways, repeaters, relays (antennae) or cell tower. Mobile devices connect to cell towers, which provide communication and location services. Towers need to overlap with another tower. A collection of them is called cell which is why we say cellular service
GSM
Cell phones use _ networks to make voice calls and send data
The cellular networks support 3G, 4G, and 5G
G stands for generation
GSM
SIM
Subscriber Identity Module
_ cards are used to connect mobile devices to GSM networks
Chip contains info about your account, identity, and device
Uniquely identifies devices on a GSM network
SIM
WPAN
Wireless Personal Area Network
_ is a wireless standard used for transmitting data over short distances.
Approximately 10 meters or 30 feet
Can be used to create a WPAN which is a type of personal network consisting of connected devices
Bluetooth
There are numerous options for mobile email communications. The two primary categories are _
standard and web-based
The three standard mobile email communications includes _
POP3, IMAP, and Exchange
Web-based mobile email communications include _
Gmail, Hotmail, and yahoo
POP3
Post Office Protocol Version 3
IMAP
Internet Message Access Protocol
_ is the first major email protocol
It’s a simple process
Email client connects to the mail server
Email is downloaded directly to the device
Typically, the email is then deleted from the server
It is a recieve protocol only, can only recieve incoming email and not send mail
POP3
_ includes all the same features as POP3
Main difference is it allows email to be synced between multiple devices.
Email is stored on the server instead of being downloaded directly to the device
It is a reiceve protocol only, it can only recieve incoming email not send mail
IMAP
SMTP
Simple Mail Transfer Protocol
To send email you need the protocol __
this is a sitiuation where you are using a home-based email account that your internet service provider is giving you then they will give you an outgoing server to use
SMTP
is a proprietary platform developed by Microsoft Benefits include Email synching folder support sent messages are saved on server
You can share calendars and documents with other people
Microsoft Exchange/Microsoft Office 365
S/MIME
Secure/Multipurpose Internet Mail Extensions
helps secures email
provides encryped authentication (ensures identity of all parties)
Message integrity (message has not been tampered with)
Digitial structures (validates the identity of the person who sent it)
Message security (it has been encryped)
Server also requires it in order to function
S/MIME
You need a digitial encryption certificate (required for sender which is you)
Digital Public Key (from intended recepient)
Email program that supports S/MIME email
ex. exchange
These are all __ for S/MIME
requirements
PRI
Product Release Information
is the connection between the mobile device and the radio transmitter
updates can contain radio setting like ID numbers, network codes, country codes
Updating can add features and increase data speed because it is a physical aspect of the device itself
PRI
PRL
Preferred Roaming List
is a list of radio frequencies residing in the memory
different frequencies are used in different geographic areas
This ensures that mobile device connects to the proper tower
PRL
CDMA
Code-Division Multiple Access Networks
is commonly used on code-division multiple access (CDMA) networks
based on codes in your phone, that determines which network you should be using
All of us can use the networks at the same time but the codes are used distinguish my transmission from everyone else’s
Updates can contain radio bands, sub-bands, service providers ID’s
PRL
is firmware used by cellular modem manufacturers
controls all the GSM and 3G phone RF Waves
Keeps code found in chip current by performing necessary updates
Baseband
are radios found in mobile devices are equipped with firmware
Manufacturer updates often include mode/mbaseband firm updates
Radio Firmware
IMEI
International Mobile Equipment Identify
is used to identify a physical science
hard coded into device making it difficult to change
Every device has a dfferent number
helps prevent the use of a stolen mobile devices
it can be reported to a carrier and blacklisted
This can be shared with other cellular networks
The blacklisted device will not be able to be used even with new SIM card
IMEI
IMSI
International Mobile Subscriber Identification
is a unique 15 digit number
first three digits represent mobile country code (MCC)
-where subscriber lives
The next two digits represent the mobile network code (MNC)
The remaining numbers (typically around ten but could be less) are the mobile subscription identification number (MSIN)
They indicate the actual subscriber
IMSI
VPN
Virtual Private Network
is a service that creates a secure direct connection to another network
eg. internal intranet
commonly used when logging onto public wifi
-end users are instead redirected to a different to different endpoint
-no longer seen as using a public network
Use encrypted tunnel to establish connection to internal network. You can operate once signed in exactly as you were in the network (gives new IP)
VPN
The benefits of _ are
security - prevent sensitive data from being exploited
it is encrypted
Access geo-specific content known as location spoofing
VPN
TCP
Transmission Control Protocol
is used by protocols like HTTP, SMTP, and Telnet
TCP
UDP
User Datagram Protocol
is conenectionless protocol
faster transmission and faster than TCP
You do not need any acknowledgement of message recieved
Used for message transport
UDP
FTP
File Transfer Protocol
is a client/server configuration used to transfer files
Exclusively TCP-based service
FTP
utilized two ports call data port (port 20) and Command port (port 21)
FTP
The two modes of FTP are
Active and Passive
mode of FTP is when connection is initiated by the client using port 21
Active
mode of FTP is when the server connects back using port 20
Passive
SSH
Secure Shell
is typically used on UNIX or LINUX environments
provides you with a terminal application
Nothing happens on your system, the commands are transmitted to the other end and something happens there on the servers
SSH
provides confidentiality and integrity over an unsecured network
-used public key cryptography
encrypted
commonly used to secure remote network logins
SSH
SSH uses port
22
Telnet uses port
23
is designed to support remote logins and communication between two computers
communication is not encrypted
information is sent to plain text and subject interception
Telnet
The benefits of _ are they have faster access time, reliable (no moving parts) require less power, make less noise, and usually physically smaller
Solid State Drive
VGA
Video Graphics Array
SMTP uses port
25
_ sends internet e-mail transmissions. Email transmission use it to transfer messages from one server to another
SMTP
POP3 uses port
110
is a client/server protocol used to retrieve e-mail
by default, messages are deleted from the server after user has downloaded email
built into most popular e-mail products
POP3
IMAP uses port
143
is used to retrieve mail stored on a server
messages can remain stored on the server as well as stored locally on all devices
-users can organize messages by using folders/containers
IMAP
is ideal for users that use multiple devices
work computer
home computer
smartphone
tablet
every device can receive the same message
IMAP
HTTP
Hypertext Transfer Protocol
HTTP uses port
80
sends and receives web-based client requests
eg. used to view HTML pages or data
can use port 8080 as an alternative
HTTP
The _ client, your browser is responsible for generating request.
The client uses Uniform Resource Locator (URL) to locate and request information from a web server
eg. an HTML page
it is requesting to see website
request are then sent back to server using TCP/UDP port 80
HTTP
HTTPS
Hypertext Transfer Protocol Secure
HTTPS uses port
443
is used for secure web browser communication
highly resistant to eavesdropping and interception because it uses Secure Sockets Layer (SSL) communication back and forth are encrypted
secure connections can be identified in website address line by a padlock or an unbroken key
HTTPS
DNS
Domain Name System
DNS uses port
53
is for simple lookups and data replication
DNS
DHCP
Dynamic Host Configuration Protocol
is used to assign IP addresses to network devices
IP addresses can be assigned in two ways, manual and automatic (client requests IP address from the server)
DHCP
DORA
Discover, Offer, Request, Acknowledge
Requesting an IP address from a server uses a process sometimes referred to as
DORA
is when your client system boots up and realizes that it is set to obtain an address automatically so it sends out a discover packet which is asking are there any DHCP servers on this network
DORA process
During the _ you do not have an address yet
the only way to communicate is to broadcast or send a packet is heard by everyone. You cannot send a packet to a specific server when you don’t have an address. All DHCP servers will hear the discover and they will all offer. Your client will select one from all offers that come in (request) and other servers will then withdraw. The one server that offered the address that you requested will acknowledge the fact that you requested it
DORA process
DHCP servers use the UDP port _ to offer and acknowledge
67
DHCP clients uses UDP port _ to discover and request
68
The benefits of _ are simplified administration and centralized network configuration
DHCP
RDP
Remote Desktop Protocol
RDP uses port
389
is a Microsoft proprietary implementation protocol
designed to allow remote users to have a graphical interface while accessing another computer
the graphical interface is the entire desktop of the computer
commonly used by administrators who want to user their workstation system in their office to connect through to multiple different servers
RDP
RDP services include _ which is mouse and keyboard functionality
input support
RDP services include __ which includes audio and printer
You can hear a sound from speakers or print form the server on your system
output support
In RDP Services you can have __ between client and remote host which means that you could copy text from my system and paste it to the server of vice versa
clipboard sharing
RDP services has _ which is implemented if you have an application that you feel won’t run very well on client systems but it runs perfectly fine on the server since its newer.
You install the application on the server and then allow users to remote into the server to run the application
application support
NetBIOS
Network Basic Input Output System
controls how application residing on different computers communicate on the same LAN
commonly used in Ethernet and Token Ring Networks
allows computers to communicate by using names
NetBIOS
NetBIOS communicates over UDP ports
137 and 138
NetBIOS communicates over TCP ports
137 and 139
SMB
Server Message Block
SMB uses port
445
is a client server communication protocol for sharing access to network resources such as files, printers, serial ports, and other resources
SMB
is also referred to as Common Internet File System (CIFS)
commonly used when working with network attached storage (NAS) units
gives you the ability to share a resource and then to connect to and access the resource
SMB
SLP
Service Location Protocol
SLP uses port
427
enables computers to dynamically locate services in a local area network
SLP
provides users with an easy to use interface to a network’s resource information
SLP
is an alternative to Lightweight Directory Access Protocol (LDAP)
SLP
are a type of SLP agent that has subscribers and workstations. These are clients. They want to know what is out there
User agents
is an SLP agent that has peripherals and resources
these are the servers
Service agents
are SLP agents that can cache peripheral and resources information within service agents to reduce traffic
Directory agents
The three types of SLP agents are
user, service, and directory
AFP
Apple Filing Protocol
is a Mac OS file protocol that uses port 548
enables users to access outside system files
Includes security that provides features that restrict user access to certain files so that not anyone can get to any file
AFP
An AFP feature is _ access where users must first establish a remote file server connection
Server file
An AFP feature is _ components which manage components such as files, volumes, and AFP calls and folders
file system
In _ you will gain access too directory attributes file attributes backup date request count creation date file creator and destination directory ID
AFP Frame Parameters
LDAP
Lightweight Directory Access Protocol
is an application protocol that uses port 389 to search a directory service for objects such as organizations, individuals, and resources like files and devices
LDAP
LDAP uses port
389
can create a hierarchy (organizes all the resources) that begins with a root directory - single parent container that contains everything eg. countries organization organizational units -divisions -departments Individuals -people -files -resources
LDAP
benefits include allows multiple independent directories uses a global naming model -ensures uniqueness runs over TCP/IP and SSL Supported by services such as DNS for resolving object names Open source protocol
LDAP
SNMP
Simple Network Management Protocol
is an application layer protocol that uses ports 161/162 to manage and monitor network devices
SNMP
provides a common language for network devices in a LAN or Wide Area Network (WAN)
SNMP
SNMP__ is the most recent iteration
it has many security enhancements like
protect packets during transit by authenticating and encrypting SNMP messages
version 3
is a program that runs on hardware or service used to monitor and collect data
eg. bandwidth and disk space
SNMP agent
SNMP ___ and __ are nodes on which an agent runs
devices and resources
SNMP __ is the centralized console
any system where you can centralize and gather up all of the data that is being reported by the agents
Manager
All of the data from the SNMP Manager is stored in the __ which is a database file that itemizes and describes all of the objects
Management Information Base (MIB)
In the __
- SNMP Manager Create get request (asking for info from the agent) PDU message (Protocol Data Unit)
- SNMP Manager Send GetRequest - PDU message
- SNMP Agent Recieve and Process
- SNMP Agent Generate response
- SNMP Agent Send Response
- SNMP Manager Process response
SNMP Information Poll Process
DVI
Digital Visual Interface
A name to IP address mapping is a request sent out over port
53
A remote desktop connection uses port __by default
3389
The characteristics of the __ protocol are that
it is reliable
it uses acknowledgments
TCP
An outgoing email is sent out over protocol
25
If a webpage is requested over port 443 you would expect to see the prefix __ in the address bar of the browser
https
Requests over port __ use the protocols CIFS and SMB
445
port __ is used by SSH by default
22
The lightweight directory Access Protocol uses port __ by default
3389
The __ protocol would be best suitied for searching for a file on FileServer1
Net BIOS
Traffic originating over ports__ would indicate monitoring a network device
161 and 162
agents are components of the SLP protocol
Service and User
Requests originating from port __ would most likely be coming from A Mac client
548