COMPTIA IF+ Flashcards
What is the most common character set used for coding to represent text in computers?
American Standard Code for Information Interchange (ASCII)
What type of notation is used in common math?
Decimal notation
How is binary notation expressed?
A single digit in a range from 0 to 1 is used. This number represents an on or off state. Each column is worth two times the column to its right. This is also known as base 2.
What needs to be installed on a PC to manage computer hardware and software resources?
Operating system
Why are server operating systems likely to include software packages (or roles)?
They often use one role to run network services and a different role to support specific functions for more users.
In the Device Manager window, you notice a yellow exclamation mark next to a specific device. What is most likely the problem?
The driver for that device is either missing or the wrong version.
When a yellow alert is displayed next to a device in the Device Manager window, it indicates a problem with that particular device. In most cases, there is a problem with the driver. Installing the most current driver for the device is a recommended first step.
You need to partition a disk into two separate drives. Where would you go to do this?
Disk Management
You find you are unable to control your computer, and a message on the screen states that you must pay a fee before you can once again assume control of your computer. Which type of malware is infecting your computer?
Ransomware
What action can help mitigate against the risk of Man-in-the-Middle (MitM) attacks?
Making senders and receivers authenticate themselves and use encryption to validate messages
What action can help mitigate the risk of impersonation attacks?
Implementing strong identity controls, such as badging systems for building access and multi-factor authentication for network access
How do cyber criminals typically use wiretapping to steal information?
Using a hardware device that inserts the hacker between two hosts
In which type of email-based social engineering attack does a person pretend to be someone else for the purpose of identity concealment by manipulating an IP address, MAC address, or email header?
Spoofing
If the IT administrator asks you to prevent snooping by sanitizing an old hard drive, what action should you take?
Thoroughly delete and overwrite any traces or bits of sensitive data on the hard drive.
What technique can be used to prevent eavesdropping on a data network?
Encrypting data in-transit
What is a social engineering attack?
An attack that depends on human factors and deception rather than technology
Which action is an example of an appropriate redundancy measure?
Using a backup power generator in a hospital to provide electricity to critical life-support systems
Redundancy helps prevent outages and possible data loss; however, the technique used should fit the situation. Using a backup power generator on life-support systems is a good usage of power redundancy.
Which of the following examples illustrates a successful phishing attack?
A user replies to an email with his bank account number because the message indicated he was required to do so.
What action can help mitigate the risk of replay attacks?
Ensuring that applications use encryption and time-stamping to make certain that the tokens cannot be misused
If someone claims to be receiving spim, what problem is occurring?
The person is receiving advertising or promotional schemes through instant messaging.
If someone claims to be receiving spim, that person is receiving advertising or promotional schemes through instant messaging. The term “spim” refers to the same basic problem as spam, whereby the user gets bombarded with get-rich-quick scheme emails that contain advertising materials or misleading promotional content. The difference between the two is that spam is delivered by email and spim is delivered through an instant messaging (IM) program.
What type of USB connector would you plug into a host?
USB Type A
You would use USB Type A to connect to a host. The connector and port are both shaped like flat rectangles.
What type of device would you connect using a Digital Visual Interface (DVI) port?
A form of flat-panel display equipment
Digital Visual Interface (DVI) is a high-quality digital interface designed for flat-panel display equipment. You would connect the DVI port to the corresponding port on the back of the monitor.
What is the standard resolution of the Video Graphics Array (VGA)?
A resolution of 640x480 with 4-bit color
IBM created the Video Graphics Array (VGA) standard, which specifies a 640x480 resolution with 16 colors (4-bit) at 60 Hz and is long obsolete.
What is the main difference between a Solid State Drive (SSD) and a Hard Disk Drive (HDD)?
The SSD uses flash memory and the HDD uses platters.