comptiaa q1-4-3 Flashcards
The Boot tab lets you configure basic settings in the Boot Configuration Data (BCD) store. You can change the default OS, add boot options, such as Safe boot, with minimal drivers and services, and set the timeout value, the duration for which the —
boot options menu is displayed.
The Services tab lets you choose specifically which services are configured to run at startup. The date that a service was disabled is also shown to make —
troubleshooting easier.
The Tools tab contains shortcuts to various administrative utilities including System Information, Configuring UAC and —
Registry Editor.
A modem is a common SOHO network hardware that connects to the service provider cabling and transfers frames over the link. The modem type must be matched to the —
network type.
A router is a common SOHO network hardware that forwards packets over the WAN (Internet) interface if they do not have a local destination IP address. Some appliances may provide the ability to configure local subnets, though this is not typical of the devices supplied by the —
service providers
A switch is a common SOHO network hardware that allows local computers and other host types to connect to the network via RJ-45 ports. This will be an unmanaged switch, so no —
configuration is necessary.
An access point is a common SOHO network hardware that allows hosts to connect to the —
network over Wi-Fi.
Encryption is important, but in most cases, a default encryption method is already set, out of the box. The default encryption allows for quick and immediate use of —
the router.
Updating the device firmware will provide the latest router features and even updated —
security patches, if applicable.
The Service Set ID (SSID) is a name set up on the WiFi router for users to quickly identify and connect to it. The SSID can be broadcast or hidden from —
public view.
A strong passphrase is the minimum layer of security required so that only users with the passphrase can access the WiFi router. This prevents potential hackers from gaining easy access to the —
Wireless Local Area Network (WLAN).
Kerberos allows Single Sign On (SSO) on a network that runs the Kerberos authentication protocol. Windows Active Directory domain networks use —
Kerberos.
Host-based authentication is when the server is configured with a list of authorized client public keys. The client requests authentication using one of these keys and the server generates a challenge with the public key. The client must use the matching private key it holds to decrypt the challenge and complete the authentication process. This provides non-interactive login but there is considerable risk from intrusion if a client host’s —
private key is compromised.
Public key authentication cannot be used with fine-grained access controls as the access is granted to a single user account. The same sort of public key authentication method can be used for each user account. The user’s private key can be configured with a passphrase that must be input to access the key, providing an additional measure of —
protection compared to host-based authentication.
Username/password is when the client submits credentials that are verified by the SSH server either against a local user database or using an —
authentication server.