Core 1 Flashcards

1
Q

48 bit address which is always manifested as 12 hexadecimal characters?

A

Media Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are systems on a local area identified?

A

Media Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is step 1 to the CompTIA Troubleshooting Theory?

A

Step 1: Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is step 2 to the CompTIA Troubleshooting Theory?

A

Step 2: Establish a theory of probably cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is step 3 to the CompTIA Troubleshooting Theory?

A

Step 3: Test the theory to determine cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is step 4 to the CompTIA Troubleshooting Theory?

A

Step 4: Establish a plan of action to resolve the problem and implement the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is step 5 to the CompTIA Troubleshooting Theory?

A

Step 5: Verify full system functionality and, if applicable, implement preventive measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is step 6 to the CompTIA Troubleshooting Theory?

A

Step 6: Document findings, actions, and outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This device contains the motherboard, CPU, RAM, and hard drives.

A

System unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The system unit contains the motherboard, CPU, RAM, and hard drives and every other device is a ?

A

peripheral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An open-air frame is called?

A

Open case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A traditional PC build is considered open or closed case?

A

Closed case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What two features is primarily used to measure the modern processor?

A

Clock speed and cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The clock speed of a task that is one cycle per second is called?

A

Hertz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1 cycle per second?

a. hertz (Hz)
b. megahertz (MHz)
c. gigahertz (GHz)

A

a. hertz (Hz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1 million cycles per second?

a. hertz (hz)
b. megahertz (MHz)
c. gigahertz (GHz)

A

b. 1 megahertz (MHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1 billion cycles per second?

a. hertz (hz)
b. megahertz (MHz)
c. gigahertz (GHz)

A

c. 1 gigahertz (GHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a CPU core?

A

CPU cores are multiple processors on one chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A CPU with only one lane is called?

A

Single-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A CPU with more than one core is called?

A

Multi-cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CPU with 2 processors that work simultaneously in same integrated circuit?

A

Dual-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A chip with four independent cores that read/execute CPU instructions?

A

Quad-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CPU’s that have 30, 60 or more cores with exponentially increasing clock speed and cores are called?

A

Threadripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does ARM stand for?

A

Advanced Risk Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
This type of chip is located in IoT devices?
ARM chip
26
What are examples of IoT devices?
Raspberry-Pi Arduino
27
This chip has simplified work instructions to allow for faster processing speeds?
ARM chips
28
What are the three types of chips?
CPU chip ARM chip APU chip
29
What does APU stand for?
Accelerated Processing Unit
30
This chip is a CPU with graphics processing capabilities combined to save space.
APU chip
31
A CPU capabilities are measured via what to main features?
Clock speed and cores
32
What methodology do ARM chips use?
Reduced Instruction Set Computing (RISC) methodology
33
x86
34
x64
35
What does x86 or x64 reference?
The amount of data the CPU can handle at any one time.
36
What bit is x86?
32 bit
37
What bit is x64?
64 bit
38
All computing standards operate in the what power?
Power of 2
39
The data being processed is considered?
Ram
40
If we have a 32 bit system, what is the actual amount of data, or RAM, that it can process?
2^32 of bits of information.
41
In the Instruction Set Architecture (ISA) x86, what applications are supported?
Only 32-bit applications
42
In the Instruction Set Architecture (ISA) x86-64, what applications are supported?
32-bit and 54-bit applications
43
In the Instruction Set Architecture (ISA) x64, what applications are supported?
Only 64-bit applications
44
What is IA-32?
Intel Architecture 32-bit
45
BIOS programming enables interaction with what and before which process takes place?
Interaction with the motherboard before the OS loads
46
Where is BIOS stored?
In nonvolatile media called firmware
47
These routines are built into firmware?
POST routines
48
What utility is part of the firmware?
System Setup Utility
49
What is the interface in which everything talks to everything else on the computer?
Motherboard
50
When speaking in terms of programming the motherboard, why is the term firmware used instead of software?
Firmware means the programming is burned onto the chip versus copied onto magnetic or electronic media through software.
51
This type of programming transfer is done through burning onto the chip.
Firmware
52
This type of programming transfer is done through copying onto a magnetic or electronic media.
Software
53
What is the purpose of the motherboard's built in programming?
It is designed to allow communication between the assumed hardware of the computer.
54
What is the name of the motherboards built in programming?
BIOS
55
The total pixels across and down is called?
Resolution
56
These monitors use liquid crystals to allow light to pass or not pass for each color in a pixel?
Liquid Crystal Display (LCD)
57
What two types of LCD backlights are used?
Fluorescent or LED Lights
58
Which ISA offers greater data handling, improved graphics performance, and better security?
x64
59
Most modern hardware and software supports 64-bit systems and are backwards compatible with which system?
32-bit systems
60
According to CompTIA, what is the longest run allowed in an horizontal run?
90 meters
61
What is the longest Ethrenet will allow for a run?
100 meters with 10 meters of patch cable.
62
This tool uses the speed of light to measure the length of a cable?
Time Domain Reflectometer (TDR)
63
Patch cables use what type of wire?
Stranded
64
What are TDRs are used to test?
TDRs test horizontal runs testing for breaks and continuity
65
You need to update the office systems and need to wake the computers by sending a package that includes a magic packet. What is the term used?
Wake-on-LAN
66
If waking-on-LAN, to avoid waking computers while always on LAN, what option should be included that only triggers the computer to wake when indicated?
Magic Packet
67
What are the link lights indicating?
Connected light - connection to a switch Speed light - speed switch is running Activity light - activity occurring on network
68
Which link light is steadily lit and on all the time?
Connected link light
69
Which Link light flickers as changes occur in network?
Activity light
70
When advising a company on configuring systems, the administrator wants to provide better information about network device status and how to monitor them in a client manual. Which of the following is the correct protocol that maintains a database containing statistics related to the activity of devices for review? a.) IMAP b.) DHCP c.) SNMP d.) POP3
c.) SNMP The Simple Network Management Protocol (SNMP) is a framework for the management and monitoring of network devices. SNMP requires a Syslog agent that maintains a management information base (MIB) database. MIB holds statistics relating to the activity of the device.
71
What does IMAP stand for?
Internet Message Access Protocol
72
What does SNMP stand for?
Simple Network Management Protocol
73
What does POP3 stand for?
Post Office Protocol
74
What does DHCP stand for?
Dynamic Host Configuration Protocol
75
The network administrator is configuring a network attached storage (NAS) appliance. What file sharing protocol should the administrator use to allow access to Windows, Linux, and Apple macOS clients? a.) File Transfer Protocol (FTP) b.) Lightweight Directory Access Protocol (LDAP) c.) Simple Network Management Protocol (SNMP) d.) Server Message Block (SMB)
d.) Server Message Block (SMB) The Server Message Block (SMB) protocol that implements Windows File/Printer Sharing is specifically for use on local networks only. Therefore, allowing access from the internet would be a security risk.
76
SNMP provides a means for devices to report operational statistics to a management server but not for?
File Sharing
77
The Server Message Block (SMB) protocol that implements Windows File/Printer Sharing is specifically for use on _____ _____ only. Therefore, allowing access from the internet would be a security risk.
local networks
78
A server administrator is joining a new startup business that will perform outsourced IT management for client firms. The administrator is to configure a web server to run on Linux, accept remote terminal connections from clients without using passwords, and encrypt terminal emulations. What can the administrator use to achieve this? (Select all that apply.) a.) Secure File Transfer Protocol (SFTP) b.) File Transfer Protocol (FTP) c.) Secure Shell (SSH) d.) OpenSSH
c.) Secure Shell (SSH) d.) OpenSSH
79
Including encrypted terminal emulations, this protocol can use SSH to achieve many other network configurations. However, it is not the principal means of obtaining a secure connection to another system.
Secure File Transfer Protocol (SFTP)
80
An SSH server listens on which port by default but is not the principal means of obtaining a secure connection.
TCP/22
81
The most widely used SSH is?
OpenSSH
82
This connection is the principal means of obtaining secure remote access to UNIX and Linux servers?
Secure Shell (SSH)
83
A top-level domain (i.e., .com) falsely represents the top of the Domain Name System (DNS) hierarchy. Why is this considered false? a.) The name server hosting the domain is a static configuration as the primary DNS server entry in the IP configuration of local clients. b.) The top-level domain cannot be a duplicate, but also it does not have to be a fully qualified domain name (FQDN). c.) The name server hosting the domain resource records on the internet is configured as the only DNS server entry and recognized by a specific IP address, not the domain name. d.) The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a fully qualified domain name (FQDN), ensuring a unique host name.
d.) The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a fully qualified domain name (FQDN), ensuring a unique host name.
84
What does DNS stand for?
Domain Name System
85
Modular memory used in laptops and mobiles devices?
SO-DIMM Small Outline Dual In-Line
86
If memory is not modular what does this mean in terms of being removable or upgradable?
The memory is likely soldered to the motherboard and the entire motherboard will need to be replaced in order to upgrade.
87
What are the form factors for traditional spinning drive platters?
Laptops 2.5 form factor Desktops 3.5 form factor
88
What is the form factor for solid-state drives?
2.5 form factor
89
What is the advantage of using SSD over Magnetic disk?
Silent Greater speeds Less latency No moving parts
90
What card sits on the SSD that requires no SATA data or power cables?
M.2
91