CompTIA ITF+ Flashcards

To learn the material pertaining to the CompTIA IT Fundamentals Exam

1
Q

What are the four stages of the computing process?

A

Input, processing, storage and output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a LAN?

A

A Local Area Network (LAN) is a group of computers or other network devices in the same location that can communicate with one another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the device that connect devices on a LAN?

A

A switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a WAN?

A

A WAN is a Wide Area Network connecting two or more LANs over a larger geographical area using a device called a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do LANs connect to WANs?

A

Via a router which connects to the LAN’s switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are RACS?

A

Remotely accessed computer systems (RACS) are servers which give one access to online apps (e.g. Office Online). They enhance local capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are specialized computer systems?

A

Specialized computer systems are computer systems that perform specific tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are I/O devices?

A

Input/output devices are devices capable of sending data (output) to a computer and receiving data from a computer (input).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is a CPU’s speed measured?

A

A CPU’s measured based on how many things it can do in one second under perfect conditions. It is measured in Hertz, typically gigahertz, that is billions of cycles per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In terms of complexity, what are the two types of modern CPUs available?

A

64-bit vs 32-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do 64-bit and 32-bit processors compare?

A

Sixty-four bits CPUs are vastly more powerful and complex than thirty-two bits. 32-bit CPU/OS can only handle up to 4 GB of RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is passive cooling?

A

Passive cooling utilizes natural conduction, convection, and radiation to cool a component. The most common type uses a heat sink which is a block of heat-conductive metal such as aluminum affixed to a chip with some heat-conductive thermal paste. The heat sink has spikes or baffles that increase its surface area. Heat wicks away from the chip into the heat sink and dissipates into the air.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is active cooling?

A

Active cooling requires the use of energy specifically dedicated to cooling the component. In most PCs, a fan is strapped to the CPU’s heat sink in an attempt to circulate air through the heat sink and away from the CPU to keep it cool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do heat sinks do?

A

They help heat dissipate into air.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does liquid cooling work?

A

Liquid cooling pulls heat into fluid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RAM?

A

Random access memory holds all active processing on a computer including the OS and running applications and data. RAM only temporarily stores data. When you turn off the computer, all the data stored in RAM disappears.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the amount of usable RAM on a computer called?

A

System memory, the total capacity of which puts a hard limit on how much stuff a computing device can work on at one time. Total capacity is measured in GB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are common RAM capacities?

A

The most common RAM size you can find in everyday laptop PCs nowadays is 8GB. Some lower-end models come with 4GB and in some cases only 2GB. Higher-end mainstream laptop models oftentimes feature 12GB and 16GB. You can find high-performance gaming laptops and mobile workstations with 24 or even 32 Gigabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a motherboard?

A

A device that provides connectivity for the various components of a computer. Everything plugs directly into the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What style of electricity does the US electric grid run on?

A

Alternating Current (AC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What style of electricity do computing devices run on?

A

Direct Current (DC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a PSU?

A

A power supply unit (PSU) is a component found in desktop computers that handles the conversion from AC to DC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What kind of connector is used by very old mice and keyboards?

A

PS/2 connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the most common connectors for I/O devices these days?

A

Universal Serial Bus (USB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the different types of video connectors?
HDMI ports, DisplayPorts (mainly with Apple), VGA ports, DVI ports
26
What is an eSATA port typically used for?
For connecting external hard drives (not currently used much)
27
What is the name of the ethernet cable used to connect networks?
RJ-45
28
What is the color coding typically used for audio connectors?
Pink for microphone, green for speakers, and black for other devices
29
What is the name of this connector?
USB Type A
30
What is the name of this connector?
USB Type B
31
What is the name of this connector?
USB Type C
32
What is the name of this connector?
USB 3.0
33
What is the name of this connector?
USB Mini A
34
What is the name of this connector?
USB Mini B
35
What is the name of this connector?
USB Micro A
36
What is the name of this connector?
USB Micro B
37
What is the name of this connector?
USB Micro B Super Speed
38
What is the name of this connector?
Firewire 400
39
What is the name of this connector?
Firewire 800
40
What is the difference between VGA, DVI and HDMI?
The difference is in both the quality of the signal that they carry and the type of signals. VGA was standard for a long. DVI was an improvement. However, both only carry video signals. HDMI (high-definition multimedia interface), on the other hand, carries high-definition audio and video.
41
How fast does a black USB port, USB 2.0 run?
480 Mbps
42
How fast does a blue USB port, USB 3.0 run?
5 Gbps
43
How fast does a USB 3.1, USB Type C, port run?
10 Gbps
44
What is a hard drive?
A hard drive is a device for long term storage. When you power off the PC, the data on the hard drive stays put. It's available when you turn the PC back on. It'll be there until you delete it, or if you're unlucky, until the drive dies.
45
What are the two important measurements for hard drives?
Capacity and speed. Capacity is generally more important.
46
How many bits are there in one byte?
8 bits
47
How many bytes in a kilobyte? Kilobytes in a megabyte? Megabytes in a gigabyte? Gigabytes in a terabyte?
1024 (2 to the power of 10)
48
What are the four features common to all operating systems?
1) It provides a user interface. 2) It provides coordination among hardware components. 3) It monitors health and functionality. 4) It provides a way to store and retrieve data.
49
What is HWMonitor?
HWMonitor is a hardware monitoring program that reads PC systems main health sensors : voltages, temperatures, powers, currents, fans speed, utilizations, clock speeds
50
What is the equivalent of the taskbar for macOS?
The Dock
51
What is the equivalent of File Explorer for macOS?
Finder
52
What is the ideal temperature and humidity for a work area where PCs are in use?
72 degrees Fahrenheit or about 22 degrees Celsius with 50%
53
Where should a monitor be placed?
At eye level, about 16 to 24 inches away
54
What are the basic steps of setting up a Desktop PC?
1) Start with hardware connectivity – connect power, monitor, keyboard and mouse 2) connect to the network 3) localization and user account setup connect to the network 4) update OS and security 5) uninstall programs and features to personalize
55
What does a surge protector do?
Protects the computer against a power surge like when lightening hits and there’s extra juice in the wires
56
What is a UPS?
Uninterruptible power supply provides surge protection but also protects the computer from brownouts and blackouts.
57
What are the basics of setting up a mobile device like a tablet?
1) accept the EULA 2) connect to the internet 3) update the device’s firmware and OS 4) customize the device by adding email and apps.
58
What kind of file needs to run to install an application?
An executable file
59
How can applications be updated?
Via properties or an update feature
60
How can application be uninstalled on Windows?
Via Control Panel or through uninstall routines
61
What are the basic image file extensions?
.tif, .png, .jpg
62
What are the basic compressed file/folder extensions?
.zip, .rar, .tar
63
How is Wi-Fi setup?
1) Connect a to Small Office/Home Office router (SOHO router) with an ethernet cable 2) Use a browser to access the router homepage 3) Change admin password and network name 4) Add security
64
What are the three internet access options for computing devices?
1) wired 2) plug the device into a wall jack 3) wireless (WiFi)
65
What are the criteria for determining the best connection?
Mobility, availability, reliability, throughput, connection delay (latency), number of concurrent connections, and level of security
66
What is throughput?
The data transfer rate
67
How do wired and wireless connections compare?
Wired always wins for availability, reliability, throughput latency, number of connections and level of security. Thus, wired always beats wireless and cellular, except for in the first category mobility. There cellular is king.
68
How is a printer set up?
1) Install printer drivers and assure good connectivity. 2) Devices and Printers | Printer Properties | Print a test page 3) Printer properties | Sharing | Share this printer
69
What are some basic physical security measures which can be taken to protect data?
Lock computers and use screen filters to avoid unwanted eyes. Shred all documents that contain any sensitive information.
70
What is spyware?
Spyware gathers information about system usage, as the name would suggest. Spyware generally installs as part of some otherwise benign program or media. Some spyware collects information about websites you visit or things you purchase. The more vicious kind like cloggers literally report the keystrokes you make.
71
What is ransomeware?
Ransomware installs on a computer and at a predetermined time locks up the data. Some will encrypt the entire contents of a hard drive. The ransomware will have some kind of payment mechanism demanding money in exchange for access to your data.
72
How can a system be protected from malware/ransomeware?
Protecting against malware starts with keeping the operating system up to date. Both Windows and Mac OS do this automatically as long as the machine is connected to the Internet. The exam might ask about antivirus programs, treat these older applications like modern anti malware software, keep both the applications and definition files updated.
73
What are the steps for dealing with malware?
Recognize, quarantine, search and destroy, remediate, educate
74
What makes a good password?
Long mix of cases, numbers and symbols
75
How can one remain protected when using public internet?
Use secure protocols (HTTPS rather than HTTP, IMAP instead of POP3 for email); Assume every public internet station is compromised
76
What strategies can be used to reduce energy usage on Windows?
Adjust the energy usage with the power option applet in the Control Panel, adjust the screen brightness, set aggressive sleep options for moving parts like hard drives
77
What should be used to clean the exterior of a computer?
A microfiber towel and mild electronic cleaner
78
What should be used to clean the interior of a computer?
Compressed air
79
Where should the interior of a computer be cleaned with compressed air?
Outside
80
What should not be used on a monitor?
Glass cleaner
81
Where should lithium ion batteries be disposed of?
Specifically designated recycling centers
82
What should be checked first for a “dead” computer?
Power and connectivity
83
What should be done first for a “stuck” system?
Reboot
84
What should be the first step for specific application problems?
Web search
85
What are the benefits of databases?
Beyond flat-file storage and spreadsheets, databases enable multiple simultaneous user access and queries on multiple fields and records.
86
What is a relational database?
A relational database interlinks multiple tables
87
What is the overall layout and structure of a database called?
The schema
88
What is used for unique identification of records?
A primary key
89
What are primary keys called when used in another table?
Foreign keys
90
What kind of file is often used to import data into a table?
A CSV file
91
What language do computers “understand”?
'Machine language'
92
What programming language is closest to machine language?
'Assembly language'
93
What do programmers often start with?
'A flow chart of expected steps and outcomes (pseudocode)'
94
What is data?
'Raw facts that are systems and processes generate and collect on a regular basis'
95
What is information?
'Data that has been processed and analyzed'
96
What are the three different ways that businesses can legally protect their intellectual property against theft and misuse?
'Copyrights
97
What is copyright used to protect?
'Creative works against theft'
98
How is copyright granted?
'Copyright protection is automatically granted to the creator of a work once they create it'
99
What are trademarks used to protect?
'Trademarks are used to protect the words and symbols used to identify products and services. The information protected by trademark includes brand names
100
How are trademarks granted?
'The owners of trademarks must register their marks with the government to achieve full protection in the US.'
101
What are patents for?
'Patents protect inventions providing the inventor with the exclusive use of their invention for some period of time.'
102
What are the criteria for granting a patent?
'An inventor must demonstrate that their idea meets three criteria. First
103
What are the basic units of storage in any computer system?
'A bit
104
How is data stored on magnetic and solid-state drives?
'When we store data on a magnetic hard drive
105
What is a petabyte?
'1000 terabytes'
106
How is network capacity measured?
'Throughput which is the speed by which a network can transfer data in bits per second'
107
What do wired networks use?
'Copper wires to transmit pulses of electricity'
108
What do wireless networks use?
'Radio waves to transmit radio signal pulses'
109
What do fiber optic networks use?
'Strands of glass to transmit pulses of light'
110
What are the terms used to discuss network speed, aside from throughput?
'Capacity and bandwidth'
111
What is the unit of measurement for the speed of a CPU?
'Multiples of Hertz'
112
What is a hertz in relation to a CPU?
'CPUs have internal clocks that time
113
What is the typical Hertz multiple used for modern computer processors?
'Gigahertz
114
What is hexadecimal notation?
'Each digit can store 16 possible values
115
What is ASCII?
'The American Standard Code for Information Interchange (ASCII) is the most common character encoding format for text data. In standard ASCII-encoded data
116
What is Unicode?
'an international encoding standard for use with different languages and scripts
117
What is the most basic data type?
'A Boolean object
118
What are the two basic form of numeric values stored in memory?
'1) Integers are values that do not have decimal or fractional parts. 2) Floating point numbers or floats are numbers that do have decimal places associated with them. The precision of a floating-point number indicates how many decimal places may be used with that number.'
119
What is the data type of a single character of text and how much memory does it consume?
'Char
120
What are character strings?
'Character strings consist of one or more characters strung together
121
What are the eight steps for troubleshooting technology?
'1) Identify the problem 2) Conduct some research'
122
What are servers?
'Servers are powerful computers that carry out a dedicated function. Companies might use servers to share files internally
123
What is IoT?
'We use the term Internet of Things or the acronym IoT to describe the way that we connect many everyday devices to the internet.'
124
What are ICS systems?
'Industrial control systems
125
What are the two brands of processors used in Windows and Macs respectively?
'Windows: Intel and AMD Mac: Intel and Apple'
126
What processor did Apple release in 2020?
'The M1 processor'
127
Aside from the clock speed, what are two other measurements for CPUs?
'CPUs are also measured in terms of their number of processing cores. Basically
128
Why can we expect that 64-bit processors will be around for quite some time?
'A 64-bit processor can manage 17 billion gigabytes of memory
129
Who is leading provider of microprocessors?
'ARM'
130
What is UEFI? What is its role? What use to perform its function?
'When a computer starts up
131
What are the two types of disk drives?
'Magnetic or solid-state'
132
What is a NIC and where are there typically?
'A network Interface Card is typically directly on the motherboard; they provide the ability to connect to both wired and wireless networks.'
133
What is a GPU?
'A graphic processing unit are powerful processors designed to perform the intensive calculation that are required to render complex graphics on the display.'
134
What technology is used by most peripherals to make it easier for users to install them?
'Plug and play'
135
What is this connector? What should you know about it?
'VGA; used by older displays and can only support a low resolution (640 x 480)'
136
What is this connector? What should you know about it?
'HDMI; able to carry both audio and video on the same wire and support high resolution video up to 5K an beyond'
137
What is this connector? What should you know about it?
'Mini Displayport; offers high-resolution up to 5K and beyond'
138
What is this connector? What should you know about it?
'Displayport; offers high-resolution up to 5K and beyond'
139
What is Thunderbolt?
'Thunderbolt is a hardware interface standard designed by Intel that allows both data and power to be sent over the same wire. The first two versions of Thunderbolt used mini- DisplayPort connectors
140
What are the two categories of storage?
'Volatile storage (temporary i.e.
141
How do magnetic and solid-state drives compare?
'Magnetic drives provide inexpensive storage that's relatively slow. These magnetic hard drives contain platters of magnetic material that spin around very quickly inside the computer
142
How is an RJ-11 different from an RJ-45?
'The RJ-11 is smaller and only has six pins.'
143
What is a PAN?
'Personal Area Network
144
What is NFC?
'Near field communication or NFC technology allows extremely short-range wireless connections for two devices to communicate using NFC. They need to be no more than a couple of inches apart.'
145
What is DSL?
'The digital subscriber line
146
How do cable internet connections work?
'Cable internet connections use a modem to convert the digital signals of a computer network to the analog signals that travel on copper wires.'
147
How do fiber optic cables work?
'These cables are strands of glass that run between locations on a fiber optic network. The fiber optic modems job is also to convert signals between our LAN and the internet connection. The modem contains a laser that it uses to convert the digital signal to pulses of light that can travel over the glass at extremely high speeds.'
148
What speeds are modern 5G networks capable of?
'20 gigbits per second'
149
What speeds are modern 5G networks capable of?
'14 megabits'
150
How might remote locations access the internet?
'They may use fixed wireless services. These services are point to point services that use radio frequency or RF communications. They could also use satellite internet connections.'
151
What is TCP/IP?
'The Transmission Control Protocol/Internet Protocol is the protocol that runs the internet and basically every LAN on the planet.'
152
What should you know about IP?
'IP is responsible for routing information over the network. IP is used both on the internet and on your local area. Network IP assigns each computer on the network its own address called an IP address. IP addresses uniquely identify computers on a network
153
What is TCP responsible for?
'TCP is responsible for setting up connections between systems and tracking the packets that are sent. If a packet is lost or damaged along the way
154
What is the addressing scheme used on the internet?
'Internet Protocol Addresses or IP Addresses'
155
In what form are IP addresses written in?
'Dotted quad notation
156
What is the range of values for each number in an IP addresses and why?
'Those numbers may range between zero and two hundred and five-fifty because each number is represented by one byte
157
How many IP addresses are involved in every network communication?
'There are two IP addresses involved in every network communication. The source address belongs to the system that's sending information
158
What are the two ways that IP addresses can be assigned?
'First
159
What is a MAC Address?
'A MAC address or Media Access Control address (aka physical/hardware address) are how computers communicate with their immediate neighbors on a network systems that are directly connected to each other. MAC addresses are used to transfer data. They are assigned to a computer's network interface by the manufacturer of that interface
160
What notation is used for MAC addresses?
'Hexadecimal notation'
161
What do MAC addresses consist of?
'12 hexadecimal digits. The first six digits identified the manufacturer of the device
162
What are the rules of thumb for identifying a valid IP address?
'- First
163
#NOM?
IP addresses
164
*Addresses with first numbers between 224 and 239 are called multicast addresses. They're used for sending messages to many systems at the same time
and they should never be assigned to an individual system.
165
What is DNS?
'Domain name system or DNS allows us to use easily recognizable names in the place of IP addresses
166
How does DNS work?
'- Every time you connect to a network
167
#NOM?
whenever you type in the domain name of a web site into your browser
168
#NOM?
it responds to the request with the IP address and then your web browser can go ahead and connect to the web site using that website's IP address.
169
- If you're a local DNS server doesn't know the answer to your question
it contacts other DNS servers to determine the correct answer and then it responds to you.'
170
What addresses do switches use to ensure date is sent to the right computer on a network?
'MAC addresses'
171
What do all switches in a LAN connect to and what manages the traffic headed to them?
'A router'
172
What is a firewall?
'Firewalls provide security for the network. They sit in between two or more networks and monitor all of the connection attempts that try to cross between those networks. Firewalls contain a set of rules describing the types of connections that are allowed to cross from one network to the other
173
What is the most common example of a firewall?
'The most common example of a firewall is a border firewall. These border firewalls sit between an organization's internal network and the internet. Any internet connections that aren't covered by a firewall rule are automatically blocked.'
174
What is the most common wireless standard used today?
'Wi-Fi technology'
175
What is Wi-Fi?
'Wi-Fi is a set of standards governed by the Institute of Electrical and Electronics Engineers (IEEE)
176
What does Wi-Fi replace wires and cables with?
'Wi-Fi works by replacing the wires and cables of wired networks with radio transmitters and receivers. Every device that supports Wi-Fi contains a radio transceiver that's capable of communicating on one or more standard Wi-Fi bands.'
177
What are WAPs?
'Wireless access points or WAPs are used to connect wireless devices within home or business networks.'
178
What are the major factors which differentiate the different wireless standards?
'Maximum speed and radio frequency'
179
What are the different Wi-Fi standards? Describe their frequency and speed
''
180
How do Wi-Fi standards with 2.4 gigahertz and 5.0 gigahertz compare? How does that effect decision making when creating a wireless network?
'Wireless networks using the 2.4 gigahertz frequency range are able to reach a longer range than other networks
181
Why are their security concerns when using Wi-Fi?
'They are radio transmissions. And as such
182
What are some factors that can alter the flow or propagation of the radio waves that carry wireless network traffic?
'Building materials
183
What is attenuation?
'When office conditions weaken radio signals
184
What is a basic antenna?
'Known as a omnidirectional antennas
185
What is a directional antenna?
'In some cases
186
What is beam forming?
'802.11 AC networks include a new technology known as a beam forming. With beam forming
187
How are antennas and access points placed in a facility?
'Conduct a site survey using specialized hardware and software to measure signal strength and provide optimal wireless signal coverage. These surveys often produce a heat map that graphically illustrates areas of strong coverage and those that require improvement. They may also identify areas where electromagnetic interference is causing disruptions to your wireless network. You can often improve your wireless coverage by adjusting the channels that you use in your building to avoid overlap with the channels used by other nearby businesses. Network engineers have the ability to manipulate the power levels transmitted by each access point to tweak coverage and prevent interference.'
188
What is SSID?
'The name of a wireless network used by users to identify it.'
189
What is the pre-shared key approach to wireless authentication?
'Pre-shared keys are the simplest kind of wireless authentication and are commonly used on home Wi-Fi networks. In the pre shared key approach
190
What is the enterprise authentication approach to wireless authentication?
'Using enterprise authentication
191
What is the captive portal approach to wireless authentication?
'Captive portals provide authentication on unencrypted wireless networks. When a user connects to a network using a captive portal
192
What is WEP?
'Wired equivalent privacy or WEP is the oldest and most common Wi-Fi security protocol. It's now known to suffer from some very serious security vulnerabilities. These issues are so significant that security professionals no longer consider web secure
193
What is WPA 1?
'Wi-Fi Protected Access or WPA is a Wi-Fi security protocol that replaced WEP in 2003. The first version
194
What is WPA 2?
'Wi-Fi Protected Access 2
195
What WPA 3?
'Wi-Fi Protected Access 3
196
What is the security status of the different Wi-Fi security protocols?
''
197
What is the protocol used for websites?
'Hypertext Transfer Protocol or HTTP.'
198
How does HTTP work?
'When you load up your web browser and type in a URL
199
What is HTTPS?
'The Hypertext Transfer Protocol Secure
200
What is SMTP?
'The Simple Mail Transfer Protocol or SMTP is used to send a message from one server to another for if
201
What is POP3?
'The Post Office Protocol 3 is an Internet protocol used by email clients to receive emails. It takes new messages that are waiting for you on the server and downloads them to your computer. Once they're downloaded
202
What is IMAP?
'The Internet Message Access Protocol or IMAP is an Internet protocol used by email clients to receive messages. All the emails remain on the server and your email client just accesses them each time you connect. This allows you to access your email wherever you are from any device.'
203
What are the secure and insecure email protocols?
''
204
What are the principal roles played by an operating system?
'- Interface between user and the computer
205
#NOM?
bringing order to hard drives
206
What is a thin client?
'Simple computer that has been optimized for establishing a remote connection with a server-based computing environment. Ex. Chrome books
207
What are operating systems like on servers?
'Servers run operating systems that are similar in function to those that support desktop and laptop computers
208
What are the two major server operating systems?
'Windows and the many distributions of Linux'
209
What are the operating systems that run on IOT devices called?
'Embedded operating systems'
210
What is a file system?
'The file system is the technology that describes how the data is stored'
211
What is the most important task performed by the file system?
'The most important task performed by the file system is remembering where the bits comprising a file are stored on the disk and organizing those files into folders or directories that help us remember where our files are stored.'
212
What does it mean that directories in a file system are hierarchical?
'That just means that we can put folders inside of other folders to help us organize our files.'
213
What characters cannot be used for a file name in a file system?
'/
214
In the context of a file system, what are permissions?
'We can set permissions on files to allow different users and groups of users the ability to read
215
How does compression work?
'Compression works by replacing duplicate chunks of data in a document with smaller values.'
216
What is encryption?
'Encryption is a technology that makes it impossible for someone to read a file unless they have the necessary decryption key.'
217
In the context of a file system, what is journaling?
'In journaling file systems
218
What is the most popular file system?
'The NTFS file system used by Microsoft is the most popular file system for the Windows operating system. NTFS provides compression
219
Can NTFS be used with Mac and Linux systems?
'It's possible to access NTFS file systems for Mac and Linux systems
220
What was the older file system used by Windows?
'The FAT32 file system is an older file system that used to be the standard for Windows systems (no encryption
221
What file system is generally used on Linux systems?
'Linux systems generally use a file system called ext4. This is a powerful file system that does support encryption
222
What are the three different file systems from Apple?
'- the Mac OS extended file system
223
#NOM?
compression and journaling. It also supports file sizes up to 60 and exabytes.
224
#NOM?
APFS was released in 2017
225
What are the core features of a file system?
'Encryption
226
Describe the main file systems including their operating systems, encryption abilities, compression abilities, journaling abilities and maximum file size.
''
227
How are executable files stored on Android devices?
'With the dot APK extension'
228
In Linux, how are executable files identified?
'Executables in Linux don't require any specific extensions for those files to execute. Instead
229
What processes are running regularly on one’s computer?
'Every application that's running on a computer system runs as a process
230
What are drivers?
'Drivers are software components that tell the operating system how to interact with a particular piece of hardware. Your operating system comes pre-installed with hundreds or thousands of commonly used drivers. These drivers allow you to set up many pieces of hardware with plug and play technology
231
What are the two basic interfaces for operating systems?
'Graphical User Interfaces or Console/Command Line. With MACs
232
Describe the basic of a virtualization platform.
'Virtualization platforms involve the use of a host machine that actually has physical hardware. That hardware then hosts several or many virtual guest machines that run operating systems of their own. The host machine runs special software known as a hypervisor to manage those guest virtual machines. The hypervisor basically tricks each guest into thinking that it's running on its own hardware
233
What are the two types of hypervisors used for virtualization?
'Type 1: Hypervisors run directly on physical hardware; Type 2: Hypervisor run on top of an operating system. Type 1 is typically used by businesses. Type 2 is commonly used on personal computers. Hypervisor is commonly used in this scenario include Virtualbox and Parallels.'
234
What are the three categories of software?
'Productivity- Productivity software is the common software that we all use to get our work done on a daily basis.
235
Collaboration software- collaboration software is the software that allows us to interact with our teammates
customers and business partners on a regular basis. Business software- The third software category business software is the software that we used to run and manage our businesses.'
236
How do web browsers connect us to the internet?
'Web browsers understand the hypertext transfer protocol HTTP
237
What are some ways that web browsers can be configured to improve their performance?
'Manually clear the cache. Deactive client-side scripting. Disable browser add-ons or extensions. If the user is on a network that requires the use of a proxy server
238
What are the different application delivery methods?
'Locally installed- installed on a local computer
239
Hosted on a local network- installed on a local server
network access is required but internet access is not.
240
Hosted in the cloud- installed on cloud server
network access and internet access are required.'
241
Describe the basic application architecture models.
'Locally installed applications are 1-tiers applications. Client/server applications are 2-tier applications. Databased-driven applications are 3 tier. These models describe how many different servers are involved in presenting an application to end users. • The general term n-tier architecture describes this approach and can be any value that we require because we can have as many layers of servers as we need to get the job done.'
242
What should one always do when installing software on a system?
'Instructions - First
243
Advanced options- Second
watch out for advanced options and configuration settings. Take the time to understand how the software will be used and work with the end users to configure these settings to best meet the user's needs.
244
What is proprietary software?
'Software purchased from a vendor. The vendor owns the software and charges for its use.'
245
What are the different possible license agreements?
'A single user license is just that it allows you to install the software on a computer for a single user to work with. A group use or site license covers many people. The license counts the number of people who may have the software installed.
246
Concurrent licenses also allow multiple people to use the software. However
a concurrent license counts the number of people who may be using the software at the same time.
247
Software may be licensed as a one-time purchase where you pay a single upfront fee for use of the software and on a small periodic maintenance fee to receive support and updates or software. License under a subscription model where instead of paying a large upfront fee
you pay a monthly or annual fee for each user.
248
Other software is developed by a community of programmers
and it's released as open-source software that's free for use under the conditions of an open-source license agreement.'
249
What is interpreted code?
'When you use interpreted code
250
What are the two subcategories of interpreted code?
'The two subcategories of interpreted languages are scripting languages and markup languages. Scripting languages are often used by administrators to automate actions on a computer and for a variety of general programming tasks. Some examples of scripting languages include Perl
251
What is compiled code?
'When executing compiled code
252
What is the main difference between interpreted and compiled languages?
'In an interpreted language
253
What is an assembly language?
'A language that allows programmers to write code that works directly with the hardware bypassing the use of a compiled or interpreted language.'
254
What is a query language?
'A query language is a language used to ask questions of databases. The most common is the structured query language SQL.'
255
What is a database?
'You can think of a database as a central repository for data that allows you to store your information and organize tables so that many people can access it at the same time.'
256
What are the advantages of a database?
'1) Databases allow multiple concurrent users to store and retrieve data. 2) Very scalable 3) Speed advantage over files for retrieving information (using SQL) 4) They can store a variety of date elements'
257
What are queries?
'Queries are simply questions that users ask of the database. They're written in a special programming language called the structured query language (SQL).'
258
What is structured data vs. unstructured data?
'Data stored in well-defined tables so it can be used for analytics. Data that does not fit neatly into tables. While most data used in databases is structured the most data in the world is unstructured. The reality
259
In relational databases, how is a column in a table referred to and what kind of information does it contain?
'Each column in a table is called a field
260
In relational databases, how is a row in a table referred to and what kind of information does it contain?
'Each row in the table is called a record
261
What is the role of a key in a relational database?
'A key is our special purpose database field that plays an important role in the relational model. They help to organize the information in tables and to define the relationships between those tables.'
262
What is the role of the primary key in database?
'The purpose of the primary key is to allow the database to uniquely identify the records in the table. When we define a primary key field for a database table
263
What is the role of the foreign key in relational database?
'A foreign key defines the relationships between tables. The primary key in a table when in another table is called a foreign key.'
264
What is DDL?
'The Data Definition Language (DDL) modifies the structure of a database. Used mainly by developers and database administrators because it's used to define the structure of the database itself. It sets the ground rules for the database to function.'
265
What are the three types of commands you should know for DDL?
'CREATE creates a new table. ALTER modifies a table. DROP deletes a table.'
266
What is DML?
'The Data Manipulation Language (DML) modifies the contents of a database. DML commands don't change the database structure
267
What are four command that you should know for DML?
'SELECT retrieves data. INSERT adds data. UPDATE changes data. DELETE removes data.'
268
Describe key-value pairs as a semi-structured approach to data storage.
'They provide a very lightweight way to store data that throws away many of the rules of relational databases. Key value pairs don't have to be organized into tables. The only requirement is that we have a key that can be used to index our data and then one or more values that we want to store in the database associated with that key. Each record can have different values and even different numbers of values. Key value stores are databases that are designed specifically to provide efficient storage and very fast retrieval of these key value pairs.'
269
What are the three main concerns of cybersecurity?
'Confidentiality of information
270
In the realm of cybersecurity, what does confidentiality mean?
'Confidentiality ensures that only authorized individuals have access to information and resources'
271
What are the five main concerns for confidentiality?
'Snooping
272
What is social engineering?
'The attacker uses psychological tricks to persuade an employee to give them sensitive information or access to internal systems.'
273
In the realm of cybersecurity, what does integrity mean?
'Integrity means that we don't allow any unauthorized changes to information'
274
What are the four different types of integrity attacks?
'Unauthorized modification
275
Describe an unauthorized modification attack and the best way to address it.
'The unauthorized modification of information occurs when an attacker gains access to a system and makes changes that violate a security policy. Organizations should consider the permissions that each employee needs to perform their jobs and then limit employees to the smallest set of permissions possible (principle of least privilege)'
276
Describe an impersonation attack and the best way to address it.
'The attacker pretends to be someone other than who they actually are. The best defense against these attacks is strong user education.'
277
Describe a man-in-the-middle attack and the best way to address it.
'A man in the middle or MITM attack
278
Describe replay attack and the best way to address it.
'In a replay attack
279
In the realm of cybersecurity, what are availability controls?
'Availability controls ensure that information and systems remain available to authorized users when they need them. These controls protect against disruptions to normal system operation or data availability.'
280
What are the five types of events that can disrupt availability?
'Five types of events that can disrupt availability: denial of service attacks
281
What is a DoS attack and how can it be protected against?
'Denial of service or DoS Attacks occur when a malicious individual bombards the system with an overwhelming amount of traffic. The idea is to simply send so many requests to a server that the server is unable to answer any requests that come from legitimate users. We can protect our systems against these denial of service attacks by using firewalls that block illegitimate requests and by partnering with our internet service providers to block those attacks before they even reach our networks.'
282
How can one protect against power outages?
'We can protect against power outages by having redundant power sources and backup generators that supply power to our systems when commercial power isn't available.'
283
How can one protect against hardware failures?
'Servers
284
How can one protect against service outages?
'We can protect against service outages by building systems that are resilient in the face of errors and hardware failures.'
285
What does a host firewall do?
'Host firewalls block unwanted inbound connections from elsewhere on the network. The firewalls do this by restricting the systems and ports that may communicate with our devices.'
286
What are the basics of device security?
'1) anti-virus software 2) host firewall 3) passwords 4) security updates 5) systems to enforce safe web-browsing'
287
What is the first thing one should do when evaluating new software?
'Validate that the software came from a legitimate source.'
288
What does it mean to reduce the attack surface?
'Reducing the amount of software in a system to the smallest possible amount'
289
Why is it dangerous to obtain and install software from an unknown source?
'If you download software from any source other than the original equipment manufacturer
290
What are PII and PHI?
'Personal Identifiable Information and Protected Health Information'
291
Does one have a reasonable expectation of privacy when using an employer provided device?
'No
292
What are the four types of documents in the security policy framework?
'Policies
293
What are security policies?
'Security policies are the bedrock documents that provide the foundation for an organization's information security program. Compliance with policies is mandatory
294
What are security standards?
'Security standards prescribe the specific details of security controls that the organization must follow. Standards
295
What are security guidelines?
'Guidelines are where security professionals provide advice to the rest of the organization
296
What are security procedures?
'Procedures are step by step instructions that employees may follow when they're performing a specific task.'
297
What are the three steps of the access control process?
'1) Identification 2) Authentication 3) Authorization'
298
What does AAA mean?
'In access control systems
299
Aside from password complexity requirements, what password requirements can provide additional security?
'Password expiration and password history to avoid reusing the same password'
300
Should organizations allow users to change their passwords quickly and easily?
'Yes
301
What are three authentication factors?
'1) something you know 2) something you are and 3) something you have'
302
Given that every authentication factor has known drawbacks, what solution would provide the most security?
'The solution to this problem is to combine authentication techniques from multiple factors
303
Why is an approach that combines a password with a security question not an example of multifactor authentication?
'In multifactor authentication
304
What is the least privilege principle?
'The least privilege principle says that an individual should only have the minimum set of permissions necessary to accomplish their job duties.'
305
Why is the least privilege principle important?
'First
306
What are the different approaches when designing access control systems?
'1) Mandatory access control 2) Discretionary access control 3) Role-based access control'
307
Describe mandatory access control systems.
'The operating system itself restricts the permissions that may be granted to users and processors on system resources. Users themselves can't modify any permissions. Mac is normally implemented as a rule based access control system
308
Describe discretionary access control systems.
'Discretionary access control systems offer a flexible approach to authorization
309
Describe role-based access control (RBAC) systems.
'Role based access control (RBAC) system simplifies some of the work of managing authorizations. Instead of trying to manage all of the permissions for every individual user
310
What are the different types of account in an access control system?
'Standard user accounts
311
What is the process used to guard system administrators accounts?
'Privileged account management'
312
Why are shared or generic accounts typically a bad idea?
'They make it difficult to trace who performed an action with a shared account
313
What are service accounts used for?
'Service accounts are a special type of account used internally by a system to run a process or perform other actions.'
314
What is encryption?
'Encryption uses math to transform information into a format where it’s unreadable by anyone other than authorized users.'
315
What two types of data are encrypted?
'Data at rest and date in transit'
316
What is non-repudiation?
'Non-repudiation is a security goal that prevents someone from falsely denying that something is true.'
317
What are the most common ways of achieving non-repudiation electronically?
'Digital signatures use encryption technology to provide non-repudiation for electronic documents. You might use biometric security controls
318
What are business continuity efforts?
'Business continuity efforts are a collection of activities that are designed to keep a business running in the face of adversity.'
319
What are the main ways to protect the availability of systems?
'Redundancy and replication'
320
What is a fault tolerant system?
'A system protected against small failures'
321
What is RAID?
'Redundant arrays of inexpensive disks (RAID)
322
What is disaster recovery?
'Disaster recovery is a subset of business continuity activities that are designed to restore a business to normal operations as quickly as possible following a disruption.'